bitify.com · created date: 10/18/2013 4:51:42 pm

136
ilrl i iil: i[]: iili; ii:;i "1'" fr ff! E\'ii Jesse M. Greenwald

Upload: others

Post on 19-Aug-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: bitify.com · Created Date: 10/18/2013 4:51:42 PM

ilrl i iil: i[]: iili; ii:;i "1'"

fr ff! E\'ii

Jesse M. Greenwald

Page 2: bitify.com · Created Date: 10/18/2013 4:51:42 PM
Page 3: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter lLVehicle Tit1es......... ........73

Chapter 12

The Bonded Credit Card........... .........83Chapter 13

Altemative Identification ................ ......................87Chapter 14

Insurance Fraud ......... .......................95Chapter 15

Making One's Own Credit Cards ......... ...............101Chapter 16

Counterfeit Money........ ................... 109

Chapter 17The Tenant Scam ......... ...................111

Chapter 18The Office.. ..................119

Chapter 19For the Forger's Information ............125

Chapter 20An Unethical Real Estate Scam.......... .................129

Chapter 21To Recap .....................133

Chapter22The Last Word (So Far)........... .......137

An Insider's Guide to Unwritten Rules...... .........141

Page 4: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Introduction

By the tinre you have finished reading this boolq you will be asinforrned on the subject of creating and passing false documents asanyone in the business. I have spent the better part of the last twenty-three years making a very good living in the rubberdocunrent field andthanks to modern technology and its availability, succeeding in thisbusiness has never been easier. I will explain what equipnrent is neededand how and where the forger obtains it, along wrth supportinformation to assist in understanding its usage. When one has finishedreading this booh it should be undersrandable how, wth astonishinglylittle effort, it is possible to duplicate and pass almost any documentcommonly used in the business world today.

I will also be explaining the ultimate credit-card scam. That fraudw-ill cover the industry's latest attempt at foiling credit-card fraud: thecard with a photo. I will explain how the forger makes almost any ofthe cards used today, and how he imposes a fraudulent picture on otherpeople's cards. These cards are not stoieq they are just copies of theoriginals, and are valid for all of the same things that the originals are. Iwill also explain how this sarne method is used to obtain legally issuedidentity cards and driver's licenses.

These processes and some of the others I wilt discuss aresophisticated and professional. They need to be considered with that in

Page 5: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

ii

mind. They require an investment of time and money, along with the

intelligence to make them work. Most of these scans are not for the

beguner, and they require a degree of confidence in ability that only

comes from exposure to this type of activity. There are few, if any,

experienced fraud criminals whose activities and nethods mirror mine'

Most people who are familiar wittr this kind of work have their own

way of doing things, and my methods should be viewed as a

supplement to that knowledge. Since I have no control over the

knowledge or the nrethods others may possess and use, I will nrerely

explain the tools and their operation. The reader can fill in the blanks.

Once one has mastered the skills of using the equiprnent, and

understands the processes by which the docurnents are created those

processes can be applied to rnany variations. It is not complicated or

difiicult, and aside from the initial setup, it's not really expensive to do.

The rnethods for duplicating most documents are vrtually identical, no

matter which type of fraud is being perpetrated. Once one has the

equipnrent set up and running, the only limitations will be those

unposed by lack of imagination and creativiry.

I will discuss each process in enough detail to provide an

understanding of the fundanrentals. There are always variations, so if Iexpound on sornething that seems better suited to son€one else's skills

or preferred methods, then I recommend following whatever path ofstudy provides the necessary expertise and confidence, in order to

obtain a fuller understanding. My way is just one of many, and that is

where the reader's brain comes in. After all, the one committing the

crirne is the person who will benefit or suffer accordingly, and our

study of the forger's activities will bear out this dictum.

The modern forger must acquire computer skills. It is not necessary

that the forger be a whiz or any'thing, but a basic understanding and the

abiiity to operate a personal cornputer with "Windows" and vanous

other offrce programs are required in order to adequately carry out

these undertakings. There are also a rather sophisticated scanner and

pnnter which are used in these processes, but there is nothing that one

cannot become proficient in with a couple of days of practice. 20th-

century criminals have become adept on conputers. The computer and

Page 6: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Introduction

rii

related technologies are the tools of today, not tomorrow, and the lawsof the jungle are very simple: adapt or pensh.

Page 7: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter OneThe Equipment

The Equipment

The obvious f,rst step to creating documents with a computer is tohave a cornputer. If the forger already has a computer, then he need

only upgrade it with the needed components and software. If he does

not have a cornputer, then he should get the latest model obtainable. A386 microprocessor, or better. is sufficient. For most users, the 1BMsystem is preferable to an Apple. They will both worlg but I find thatthe IBM system is easier for the less-experienced, and the scannersoftware is easier to use and install. Given the large size of the

computsr files that the forger will be rvorking with, more RAM(Random Access Memory) is raluired than the average user usuallyneeds. A very good printer is also desrable, because it is unlikely thatthe one on hand will do the job. Few people have professional-ievelequipment in ther home.

The first thing we will discuss is the printer. There are lots ofprinters floating around out there, but few that will acfualll' do the jobthat needs to be done. If one has a choice. then the Hev.lett-PackardktserJet 111 printer is recomrnended. They are no longer sold new, butnny be found used. The nnjor requirement for the chosen printer is thatit must be able to use a magnetic ink character recognition cartridge.This cartridge is called an MICR, and its use allows the forger to printitems that need to be read with a "reader. " This device can only read

Page 8: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crirnes Of Deception

2

characters that are printed with magnetic ink. Most printers do not havethis capability, and the ones that do are not cheap. New printers are

being introduced all of the tirne. so if one is shopping around, thisfunction is a rrust. The good news is that there are millions of these

ofhce-quality printers out there. and frndrng a used one is not that hard;it should not cost more than $650. but a new one can run up to $2,000.If the shopping forger is asked by a salesperson why tlls application is

needed on his printer, he need only reply that it will be used for on-demand payroll-check printing. That is the most common use for thenland mentioning it will also aLlow the forger to ask for an MICR, or a

place to get one. The HP LaserJet III is a laser jet printer, one of the

finest document-qualit), printers on the market. and. in all probability,the onlv model one will ever need to buy. It does not print in color, butcolor is not requral for the most pal't. Color needs and applicationswill be explained rn another chapter, along with the best nrethod ofachieving them. Ninety-nine percent of the work the forger will have theprinter do will be in accordance with the instructions that come with the

cornputer, so there is little more that needs to be said about the printer.It is the actual instrument that documents will be made with. so one

should not pinch penmes here.

The next piece of hardware needed is the scaruter. Hewlett-Packardalso makes one of the best models of these devices on the market. TheHP ScanJet 4c is the scanner of choice. and will do everything required.In conrputer termnologl,. it is a high-resolutiort, optical characterrecogrtition, black-cuvl-white or color, docturtert qrnlirl* scanner, witha vanable DPl (dots per inch) of over 1200. If any" of the precedingwords sounded foreign. then it should be obvious that additionaleducation rn tils area is needed. I am not trying to describe a get-rich-quick-ovemr_eht scam. If the forger understands what is being explainedhere, and has the desre to pursue it further, then it should be clearlyspecified that this is a process which is being described here, not aspecific application. It is like any t)?e of sport: once one has the

knowledge of it, he still has to enter and participate in the event he

chooses. Once the forger acquires and nnsters these skills, he still has

to plan and commit the various offenses which will result in the desired

Page 9: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter OneThe Equipment

3

outconr€ (i.e., the desired income). Knowrng how to do it properly onlyincreases the forger's chance of success; it does not automatically makeevents work out the way he would hope. The scanner (like the printer)is also completely controlled by the computer, so. aside from scanningthings on it, all of the instructions go through the pC. This scanner maycost between $500 and $1,000, depending on the upgrades found on it.The forger's needs are simple, and the basic model will work fine, but ifthe upgrades are offered, they should be taken for later use.

In a nutshell. the scanner is used to copy the documents that theforger intends to duplicate or alter. It takes the rmages from the itemswhich are put into it, and translates them urto information that thecomputer can understand. Once this information is in the computer, itcan then be manipulated into any form desired. If the conect paper isused, the lnishecl product wili be an exact duplicate of the original, andwill serve the same purpose in its business application. The details thatmake a docurnent authentic are usually the format and the signature onit. Once one leams how to manipulate these two key elenrents, almostany document in circulation today can be forged. The scanner willallow the forger to copy and reprint these elements, as well as thesafeguards that appear on almost all of the paperwork he wrll beworking with. There are details in most of these documents that willescape the naked eye unless one knows what one is lookin_s for andwhere they are located. The scanner doesn't care what it sees. it justcopies everythrn_u and translates it into the computer's memory. Whenthe documents are scanned and reprinted. these safeguards are carrieda1ong. The higher the DPI on the scanner, the higher the resolution ofthe scan and repnnt. In English. that means the better the scanner wilrread the document's details. TLus is the reason the scanner needs to beof high quality, or "lugh resoiution," as the industry Likes to refer to it.Nl of the components of the sl,stem need to be of equal quality andproficiency, or the forger u{ll be frusfated. The correct tools alwaysmake the job easier. Don't shop at Kmart and expect Saks' quality.

Page 10: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter TwoThe Paper

The Paper

The next component is the paper required to do the job. Since eachjob has different paper needs, the best solution to this problem is to getcatalogs of the various kinds of papers available in the printingindustry. The forger's needs are no different than legitimate needs, sohis method of acquisition shouldn't be any different either. The forgerhas the right to purchase the needed paper just like everyone else does;it's the infornration about how and where to find such paper thatusually keeps the comrnon person from doing this. These catalogs areoffered by all of the businesses that sell or distribute paper to theprinting industry, and getting one requires only a phone call or apersonal visit to the proper company. The phone book might supplysorne of the names the forger will need, but it is a simple matter to useone of the two major players in the game. They both have offices allover the country and will do business by phone and mail, both nrethodswhich I make use of in most business dealings concerning theseendeavors. If the forger calls Roclcy Mountain Bank Notes or DeluxeChecl<s, Inc., he can obtain a catalog of all of the paper used in theworldtday.

The forger usually gets a mail box under a business name (at aprivately run mail drop and not the Post Office), and uses it for all ofhis business correspondence and transactions. If the forger has a box

Page 11: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

6

with 24-hour accqss, he can come and go at night, and, except for thetirne when he initially rents the box, avoid the people who work there.Once the forger has rented the box, he need merely call and order thelatest catalogs of check and docunrcnt products that the companiesoffer. This is their business, and inquiries will be welcorne. Whenconnected to a salesman, the forgu says that he is gefting into thedesktop publishing business, and would like to see their catalog forpossible purchases. The salesnnn is told that the prospective buyer willbe engaged in ondemand payroll-check printing, and may have otheroffice needs. This is a corilnon desire for the snnll businessman, andthe salesman might include sorne sample products as an incentive to dobusiness with his company. Encourage this action on the part of thesalesman, and the samples wll most likely be sent. If the forger asks forsamples of their products, he will probably receive a shitload of sruffthat could be used later for practice. One loses nothing by asking, and itis remarkable how accommodating the paper suppliers are. These guysoffer a wealth of infornntion, and they can answer some of thequestions the forger might have that are not covered elsewhere in thlsbook.

The forger should not order anything but the catalog at this tinre. Theobjective is to get one's business narne entered into the cornputer filesof the company from which materials will be purchased at a later date.once the catalog has been reviewd the forger can call back and orderwhat is wanted, as the fraudulent busrness's nanrc is already listed as acustorner in the paper supplier's database. When the forger calls andorders paper, he need nrerely ask for the order desk and place an order,as if it were an everyday business occurrence. The paper company willprobably require sorne tlpe of prepaynrent, since they are dealing witha new custonrr, but COD is also corrrrnon. The forger must make sureto make arrangernents for the COD to be dropped off at his mail boxservice. A common money order is required, since a company checkwould require a business account that does not exist and is diffrcult toestablish. It is very unlikely that these activities will ever be traced backto the mail box service, but comings and goings should be kept to aminimum. The forger can place the money order in his box at night,

Page 12: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter TwoThe Paper

7

then call the owner of the rrnil box service the next morning andexplain what should be done with it. The mail box service proprietorsare usually very easy to do business with in this manner, and normallydon't mind helprng out a boxholder. The forger might want to order allof the supplies that he thinks will be needed ttrough the mail, and thenwalk away from the mail box service once they have been obtained andnever look back. If the key is left in the box upon departure along witha short note, the note will then be read and thrown into the trash to beforgotten. Businesses corne and go all of the tinre. A fraudulent one willlook normal and rnean nothrng if the shit ever hits the fan. The forgerwill still have the catalogs and the ability to get rnore paper whenneeded. The knowledge is filed away for future reference, and theforger moves on.

The above-rnentioned places supply the paper used in printingchecks, money orders, stocla and bonds, car titles, birth certificates,diplomas, certificates of deposit, and just about all of the otherdocuments used in the business world today. The forger need onlyacquire the equipment which is necessary to do the job, and technicaliyhe is in the sarne business as any printing company. Where do youthink the bank gets the checla printed that custorners order tiroughthem? They just call their prmter and order sorne checks with thepertinent information on thern It's no big secret organization orany'thing, it's just business as usual to a busy printer. If it's not donecorrectly or at the best price, the bank just shops elsewhere as anv othercustorner would.

The safeguards in this industry are few and easily defeated and thismakes nre unhappy, as I do wrsh it were harder so that more peoplecould be kept out of defrauding it. The phone book is fulI of companiesthat provide printing as their business, and they shop daily at manyplaces that supply the paper they require. The forger needs to relax,buy what he needs, and move on. If he carulot achieve this goal, hisfuture in the docurnent-fraud business is doubtful at best.

Page 13: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter Three

The Software

The Software

Consider the brain to be a computer. The information and

instructions one puts into it are like software. Without instructions andguidelines, the computer would just sit there and beep. Software is howwe introduce instructions into the computer, and everlthing we do onthe computer after that introduction is controlled by the programs inthat software. Once information is scanned into the cornputer, changingor manipulating that information requires software which contains a"cut-and-paste" application. This can best be achieved tlrough the"Windows" operatin-e systenL which can make such tasks simple to doif there is a version of "Windows" controlling everlthing. The forgerdoes not need the "Windows 95" version (or anything that expensive),but if he has it. that is fine. When shopping for the software ro set thisup. the forger tells the salesman his needs, and the salesman willdemonstrate several that will do the job. The brand is not important, as

long as it has the ability to create new documents and work with a

scanner. The good stuff has easy-to.follow irstructions. There is noway for me to be more specific than this. as there are thousands ofways to run this setup and its programs. It is helpful to get a version ofaccounting software such as "Quicken," which is a palroll andcheckbook progmm. Such programs are needed to generate phonychecks or ffeate dummy incorne statements for loan applicatiors. These

Page 14: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

10

are just a couple of the software programs one will use. Others will not

be needed until more elaborate scafiN are undertaken. The forger

obtains just what is needed in order to get started, and upgrades later."CorelDrarv" is also a very good program for creating and altering

documents, and there are several versions available. The forger should

try to buy one that is on sale. These progrars are not cheap, but they

are worth every penny in the long run.When one uses a scanner. the itens to be scanned are placed onto a

glass plate that look like that of a photocopier. and the mouse's buttonfor "scan" is pressed to start the process. Aside from turnin_e the paper

over and scanning the other side, there is nothing left to do with the

scanner except turn it on and off It is a complicated device in the

techrucal aspect, but srmple to use in its application. I cannot provide

any more instructions about its use. except to advise cleaning the glass

with care.

The printer requires very little ur the operation area aside fromtuming it on and putting the correct cartridge in it when printing checks

and engagrng rn other magnetic-ink projects. It is pretty much self-

controlling, and the functions that are controlled will be operated

through the PC and software. One good thing about the HPItr is that ithas a self-check for problems. It will tell the user if it has a problenr,

and, most likely. how to hx it. It will probably be cornpatible with the

forger's systenl srnce it is a very corrrrnon office macLune and isdesigned to be plugged in and tumed on for instant use. When it comes

time to create checks, there will be a need for additional rnformation to

be put into the pnnter's memory. The funny-looking letters and

numbers that run along the bottoms of check and some other bank

docunrents are printed with magnetic urk in special "fonts." Fonts are

specral characters and can be found in several "business font"progranx which are sold at computer stores. One should be specific

n'hen buyrn_e these, because only certain ones u.rll work on checks. Ifthe forger tells the salesman that business fonts are needed for check

printing. he r.vill be able to help. I have had a hard time in the past

tryrng to frnd such programs on my own, so I call a few places before Idrive around. They usualll' come in a package with a couple of hundred

Page 15: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter ThreeThe Software

1l

other fonts, and most people will not know what is being requested, soone shouldn't be surprised when a salesman displays a blankexpression. The specific term for these needs is Magnetic EncryptionCharacter Fonts, but good luck passing that terrn off on a salesman!The forger will also need the MICR for check printing. These run about$75 at most cartridge-recycling places. and are used all of the time inthe printing field. If a custorner ask for one by narne, few salesmenwill notice or care about the request. One cartridge goes a long way,and they have a long shelf ltfe. NOTE: l. One should always removethe cartridge when moving the printer. Toner powder can spill fromthe canridge and get into all sorts of places where it doesn't belong.2. The MICRfonts are El3B and CMC7. EI3B is used in North andCentral America and CMCT is used in South Ameica and Europewith some exceptions.

There is no universal electronic MICR font sets that will optinnllywork in all MICR laser printers. So you would have to buy a set offonts designedfor whichever printer you owt.

Optically read check processing fonts are OCR-A and OCR-\.These are mainll- used in European countries.

Additional help can be solicited from most cornputer stores by justtelling them what is needed. The on-demand printing business is agrowing field, and there is no reason for a supplier to question aprospective custorner's intentions. It is not illegal to acquire or possessthis knowledge, and the forger will just be scanning and changingpaperwork anlavay. The tools purchased will actually be overkill forwhat is needed, but there is no other way to get what is requred for top-notch forgeries. Just because the setup can do so much more doesn'tnean that the salesman, or any other instructor who might be hired tonain the forger, needs to be told what is actually going to be done withthe equipment. I have found that if one acts as if one has a person whoknows computers in his employ, one can ask dumb questions and notappear to be stupid. Remember, the forger will have a setup that isprobably more expensive than the salesman or instructor has, so it isnot a bad idea to realize this and act as if he is not the main user of theequipment and software. Once the forger has spent a few days playurg

Page 16: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

t2

with his new toy, the potential for future forgeries grows greater as hisskill level climbs. Keep in mind that the forger does not have to try touse any document that does not rneet with his satisfaction. The forgerwill have the original to cornpare his work to. The forger has all thetkne it takes to make the end product corne out perfect. The law is onlybroken if (or when) the forger passes (or attempts to pass) forgeddocurnents as authentic ones. The beauty of this type of work is that theforger can take enough tirne to do it right. If the forger is curious as tothe latest techniques used to defeat the type of fraud being perpefated"he can just call any bank and tell them that he is trying to protect hisbusiness from such a fraud. The bank will usually supply a currentcopy of the industry's pamphlet on the subject. The system can be usedto work for cnme, conversely to the way banl<s intend it to be used.They spend millions of dollars a year on counterrneasures. All theforger need do is ask for ther information in a believabre guise, and itwix be forthcoming. These types of crirnes, and the rnethods employedto counteract thern, are always increasing and undergoing refinernents,and it is up to the professional criminal to stay abreast of currentdevelopnrents. An ounce of precaution is worth a pound of cure. ln thisinstance, ten minutes of preparation and research are well worth tenyears of "rehabilitation" in the slamnrer on down the line.

a

a

List of Relevant Terms:

CORELDRAW - Software program used for creating andchanging docurnents

FONT - Term used for describing characters in printing.MICR cartridge The magnetic-ink character recognitioncartnd_ee required for checks.

QLnCKEN - Software progam used for payroll and checkcreation.

RAM - Random access fitemory is the real "thinking space" of acomputer. Without enough RAM, some files or programs won'topen or run correctly.

Page 17: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter ThreeThe Software

13

o WINDOWS Software program used for running other

proglams.

There is an rncredible amount of info at:

http://www.xeroxmicr.com/micr 1 0 1.html

and at:

http ://www. sensible-solutions.com/micr. html

Printers for which MICR cartridges are available:

Printer Model: Hewlett Packard 5Si

Printer Model: Hewlett Packard 4.4+,5Printer Model: Hewlett Packard 5PPrinter Model: Hewlett Packard 4L.4PPrinter Model: Hewlett Packard 3Si, 4Sihrnter Model: Hewlett Packard II. III. IID. mDPrinter Model: Hewlett Packard IIp. IIIpPnnter Model: Hewlett Packard 4VPrinter Model: IBM 4019, 4028,4029Printer Model: IBM 4039, 4049, Optra Series

Printer Model: Epson 6000, Toshiba Pagelaser 6

Printer Model: NEC 800/900

Printer Model: Panasonic KXP -4420

Printer Model: Penlax LaserFold 240

hinter Model: Okidata 400/800 (Not'100e)

Printer Model:TI Omnilaser 2150

Printer Model: Ricoh 4080, 4081. 4150

Printer Model: TI N{rcrolaser +Printer Model: Sharp 9500

Printer Model: Brother 630s

ST MICR LexmarkOTC Continuous Laser Printers

Page 18: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

t4

The following printers require the installation of a SIMM chip tosupport MICR. The SIMM includes the fonts and some utilities forsecunty. etc.

HP LaserJet 6P, 6MPHP LaserJet 5, 5N. 5MHP LaserJet 5Si. 5SiA4X,

Page 19: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter FourThe Notary Stamp

15

The Notary Stamp

Another piece of business equipment that is useful is a notarystamp or seal. There are some types of documents which requirethis form of authenticity to make them acceptable in normal usage.It is a reflection of the naivet6 of our sheeplike society that such asimple thing can instill a sense of security in the mind of theobserver. If one were to put a notary stamp on a piece of used toiletpaper, the large number of people who would accept it as a legaldocument would be laughable. I suggest no such deception,however. I notarize only authentic-lookrng documents, and try notto smile too broadly when they are accepted by the professionalmen and women who are their intended recipients.

The real secret to acquiring a notary stamp is to ask for it. Sincemost people don't, they inconectly assume that it is hard to obtain,and do without it. Every office-supply store in the U.S.A. carriesthem or can drect the seeker to someplace else that does. Mail boxservices seli them, as do a host of other places one can find in thetelephone directory. If one takes the notarized portion of anidocument that bears any version of the embossing-type seal mostcommonly used and accepted these days, or a photocopy of it intoone of these places, they can usually have the stamp or seal readyin less than24 hours.

Page 20: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

16

It is actually just for comparison or ease of explanation to thesales clerk. You know, a picture is worth a thousand words type ofdeal. Plus, it shows the person that you are in possession of whatyou want to have made because you want another one or you havelost the original and simply want an exact duplicate. It really comesdown to just making it quick and easy on the salesperson., whomost times is tickled to have a picture to go with her order sincethey usually subcontract out such work, and a picture is the bestway to insure the final product. The key is to act like you simplyare doing a normal thing that you have done before. Or, that youare simply doing this for a busy friend... this way reducesanswering questions you might not want to answer. Remember, ifyou encounter any resistance or feel you don't hke the setup, justgo to one of the many other places that do the same thing, orcontact a service that actually runs errands for you for a fee. This isnot against the law for the most part, and few will question youdoing it if you dress and act the part of the professional you aresupposed to be ponraying.

The application for a notary seal is available in most places forthe asking, but it is not necessary for the purchase of one, it only"sometimes" facilitates the process, if the forger wishes to implythat they are new and unfamiliar with the process. If you play dumband try it at one or two places, when vou approach the third place,you should be a pro at the small talk required.

In some states. the application can be made directly to theDepartment of Licensing. The forger can call and inquire, or he canpolitely ask a notarr what the procedure for obtaining a seal is, andthen follow his or her instructions.

The professional forger usually prefers the embossing type ofnotary seal to the stamp type. It is much more official-looking. andis used more often on the sorts of documents upon which I rvill beexpounding. One doesn't have to show any particular type ofnotary identification in order to buy it. I don't think that there isany such thing, and I have never been asked for any. If the forgerstates that he is a notary, who is going to challenge that assertion?

Page 21: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter FourThe Notary Stamp

l7

Certainly not an office-supply store employee, whose job is toassist. not harass. the customer.

fifi'*x:''"-ItcEnsrnc

APPLICATION FOR APPOINTMENT OR REAPPOINTMENT AS A

S20.00 u:+ re- ra":e card e rj grASr NGION STATE TREASURER

PLEASE WPE OR PRINT CLEARLY

BUS NESS ANO PROF:SSIONS DiV S ON

NOTARY PUBLJC SECIIONP O 80X 902io!YMF A !!A 98507.9027

ENDORSEB SIGNATURES

I theundersgnedendorser,bengapersone gbelcvoletnlhestateolWashrngton andoflheageollSormore.belevethe applicanl lo r a notary publrc appornlment w hc s not re ated to me, to be a person of I nteg.rry and good mora characterand €oable ot oerform no notana acls

l

2

3

- o,ma{ \a-

ffi

FOR OFFICE USE ONLY

Notary application foftns are dffirent in every state.An applicant in Washington State must fill out this two-page form.

Telephone number ( ) ] WA Res oent ] Ncn-res cer: State

Date of Birth I ' Ser f t"l X F Curen|y emptoyed by lhe slate c,f/ash.Elcn? -V". I

Previous aOOornlmenl date: name and cense relerence number

Page 22: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And

18

Other Crimes Of Deception

APPLICANT PERSONAL DATA

1 Have you been conv cled ol a cfime - sdemeaaor or te ony In th s stale ary cl.er sialeor any olher lufisdrct on w thrn the pas: tea years?

2 slhereacrmnalcompant accusalron,orrnlormatonpresentlypendngagatnstyouorareycucurrenlyunderndrclment In th s state. any other stale by the federal government. or any olhef llrsd ct an? - Yes - No

3. Has any protessronai or occupationa license, certlfication or permil held by you. been I ned suspercec revoked.refused or denred In this state, any other state by lhe federa government or any olher jur sdrct on? _ Yes No

4 Have you ever had a crvil court order verd ct, or judgment enlered agarnst you in any courl oi competeni j!r sdrctLonn thrs state, any other slate, by the Iedera gov€rnment, or any other jur sdrclron? ! ves ] tto

Please attach a lener of explanation for any affirmative answers to the above queslions, including charge(s), dateof conviclion, civil iudgement or order, county iurisdiction. state, and disposition of charges.

DECLARATION OF APPLICANT

I Sole-^ ) :trFd' a"'- --:' oera tv o'

SLgnedandsworntobelore meonthrs_dayof __ 19

perlury that lhe personal infomat on I have prov ded in this appircat on rs lrue comp ele and coileci tia iave carelullyreadthemalenalsprovdeddescilbngtfedu:resolanoiarypub|crnandlorthestateolWashrngton anc l:at w perlormtothebeslolmyabrlity.allnotarralaclsrnaaccTqarcewrlhtheaw Ihavecaref!yreadlhequeslo.:. -elt,e!ongapplicalionandhaveansweredthemcompetey.anCp!rsuan11oFCW9A720B5 ldeclareunderpenatyoigerl!ryunderthe law oi the state ot Wash ngton that my answers and at stalereits maCe by m€ heretn are true anc ca'reci Shou dllurnrshanyialseinformalionrnlhrsapprcatLon,lherebyagreelhats!chac:shalconstltute€useforthede:a suspensonor revo€lon ot my appo ntment as a notary pub c n lhe stale ol wasa ngla^

SEAL

UPON FILING, THIS APPLICATION BECOMES A PUBLIC RECORD AND IS SUBJECTTO PUBLICDISCLOSURE PROVISIONS PURSUANT TO RCW 42.17.

Page 2 of Notary application.

Page 23: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter FourThe Notary Stamp

l9

The forger need merely pick up several applications and fill themout with different information, then drop them off at several office-supply emporiums and see what happens. If accosted, he is just a

messenger doing his job, or a person doing a favor for a friend. It isbest to have several different notary seals anyway, in case there is aneed for several pieces of notarized paperwork to be used at thesame place.

It is helpful to use the words "state"- or "county"-somethingwhen obtaining notary seals, such as "Clark County Developers" or"Southern Nevada State Planning Company." The object here is tocreate the impression, for the person looking at the notarizeddocument, that it is official. If they see the words "state" or"county" on it when they look at the already-hard-to-seeimpression, they will most likely accepr it as ie-eitimate.

Manipulate the seal with a computer if you can, or simply useone as an example of the way you want yours to appear. Theround-impression types are actually pretty restrictive in their layoutdue to obvious reasons, and the desire to have one made fromanother's layout is an easy explanation, and makes sense too.Remember, they are a service that makes what the customer wantsthem to, and most often their employees view the customer as

someone they wish to please, so act like you are doing one of thethousand other things you do regularly, and you'11be fine.

This is a game of illusion, and the forger must never stoppracticing it, even when it looks like there is no need for it. Beforelong, it becomes second nature. and when one least expects it, a

small, faintly-steaming portion of bullshit will save the day. Thewords on the notary seal are not critical, but why not cover as manybases as possible? It requires so little effort to do the job correctly,and I can't see doing it any other way.

It doesn't matter which state the forger obtains the notary sealsin, as they are accepted everywhere in the country. I have neverbeen asked a single question concerning the seals on any of thedocuments I have passed as legitimate, and they number in thehundreds. One should keep in mind, in case one is asked. that the

Page 24: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

20

document was notarized by someone whose name came from atelephone directory, or someone who was met at an unrememberedplace of business, or perhaps someone who advertised via a sign atthe side of the road with their telephone number on it. How muchdoes anvone really remember about any notary whom they haveused before?

l*:>,qe6" -- 1

The embossing-r,v^pe of notary seal has been in use for many years.The forger often uses this kind of a seal.

Notary seals are also available as stomps,either traditional (abot'e) or pre-inked (betow)

Page 25: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter FourThe Notary Stamp

2l

Only a small percentage of the work that a forger does willrequire a seal anyway, but I covered it because it is an importanttool that all aspiring document defrauders have at their disposal.Besides, a notary seal will come in handy more often than might beimagined. Since the part of the document that the seal is affixed torequires one to inscribe the expiration date of the seal next to it, anydate desired can be entered, and it will last forever. I do, however,change seals every year or two. They are easy to get, and one doesnot want to leave a trail if it can be avoided.

NOTE: This device comes in very handy in the fake IDdepartment, as well as when selling stolen cars.

The knowledgeable forger takes advantage of the servicesdispensed by the National Notary Association (NNA) by calling itsnational office at (818)713-4000. This organization offers a home-study course that provides in-depth information about the servicesthat a notary public can and cannot provide. The NNA publishesThe National Notary Magaz.ine, whose editors have preparednotary law primers for several states. Membershrps cost $29 peryear, and members are entitled to discounts on NNA products.Catalogs are free. NNA publications are often found in publiclibraries.

Page 26: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter FivePutting It All Together

Putting It All Together

The next step is assembling all of the new toys and making them dothejob for which they are intended. Ifthere is no budget crisis, I rent anoffice to work out of somewhere. One can find an "Executive Suite,"or other small offrce space, for a few hundred bucks a month in mostcrties. Renting one allows the forger to both run an operation and havea social life that doesn't have to be kept out of a certain roonL ornecessitate lying about why he has such a serious array of cornputerequiprnent sitting at home. Most people don't, and it attracts attention.The forger can tell all of the stories he wants to, but curiosity is a

dangerous thing. Besides, getting up and eourg to a workplace as if one

has a realjob answers a lot ofquestions that nosy people routinely ask

about the non-working person who appears to live pretty well. Going tothe office also puts the forger into the work mode! After all, this is ajob, not a hobby. If someone is coming in to explain certainapplications on the cornputer. or there are phone calls or mail that isbusiness-reiated. an office is a necessary cover and a place whoselocation only the forger and those he chooses to meet there need know.

If the forger is doing the smart thing by living and creating theproduct in one city and going to another city to generate revenue, anoffice and a self-employed appearance allow him to offer anyexplanations that may be necessary in order to demonstrate his

Page 27: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

4,1

legitimate livelihood. It is assumed that most pmple work for a living,so if the forger intends to pass more or less unnoticed" he must play theganre a little and fabricate a false ffont.

crin* has always been the easy part of any adventure. The real testof a survivor is his ability to blend in and pass the ,,normal person" test.An office is also desirable because it restricts the number of people whonight accidentally get a look at the projects in development. people arebasically asleep, but even a drowsy person knows what official-lookingstuff is, and the paper and other materials on hand definitely qualify asoffrcial-looking stuff. Most offices have plenty of business-relateathings lying about; this always happens. no matter how hard one tries tokeep it tidy. Relationships may come and go, but if knowledge of thebusiness at hand goes with thern, this creates liabilities that can comeback to haunt one later. Most of the materials the forger works withwill look offrce-related if seen in a workplace, but rather strange athome. Remember, this is not a one-time score, but an ongoing criminalenterprise. certain rules must be applied to one's tifestyte analractices.The forger is going to be coming and going fairly regularly, and willsometimes be gone for several weeks at a tirne. He must consider thepossibility that someone might get a peek at the setup without hisknowledge or permission. The forger should never give anyonepermission to look at anything that he is doing, unless he is naiveenough to bel-reve that they wiil keep it a secret forever. If the gear andpaperwork are kept in an office envtonrnent, they will rrrcst likelyappear to be normal and" therefore, be ignored. Unfortunately, thefamily and friends in our live-q whom ue choose to trust cannot becounted on to keep their noses out of our private places and affairs. Ifaperson is gone, and pmple know the tirne frarne, I will bet a Ferrari thatthey' urll snoop. No one can be sure enough to bet against nre. ourprying loved ones will convince themselves that they can talk their wayout of it if caught. Besides, they are loved, and most people considerbeing loved a license to do anything (and most do). Just reflect back onyour life for a moment, and you will see my pourt. It began with yourparents going tt*ough your pockets, and it will end with the morticiandoing the same thing.

Page 28: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter Six

Getting Started

25

Getting Started

The steps are pretty snaightforward, and the forger should soonreceive the slarter package from one of the paper suppliers. If this does

not happen in a tinrely fashion, the forger srmply orders a variety ofstock so that he will have some practice with different tlpes ofdocuments. Most of the docurnents used today follow sonre basicformats, so the stock is often already cut to size or has perforations inthe correct places. Often, there will be industry-accepted printingalready on the paper which is ordered, such as: a border on certificatesor blank checks; the words "Sign Here" or "Endorse Here"; and aline for the actual signing of sorne of the nanres that are expected to bewriften on these docurnents. When one buys the paper to forge palrollchecla, it will corne in sheets like those which banks provide when

business accounts are opened. There u'ill be a certain amount of checks

per page, and the borders and perforations between each check on thepage will already be there. All the forger has to do is add the rest of theinformation, and the procedure is finished. The reason a lot of paper

comes this way is because the information printed on the backside of adocument is standardized, and the only personalized printing needed

will be on the fronside. This reduces the amount of time it takes toprint payroll checks, and eliminates the need to pnnt on both sides ofthe paper. ln sorne cases, the nanrc or lo_eo of the paper manufacturerwill appear in small print in the corners or alon,q the borders. This iscornmon, so the forger will see different ones as he receives and

inspects authentic documents. It's no different than the various mint

Page 29: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Dccument Fraud And Other Crinres Of Deception

lo

designations that appear on rnoney, so there is no need to worry aboutit. Size and shape are also prefty much standardized, and are alreadyprepared for the forger by the manufacturer.

Toner (ink) is all pretty much the sarne color, so all of the forger'sneeds will be covered by a normal toner cartridge. When the forgercreates check (or other docurnents that need the magnetic ink toner),all he does is switch cartridges in the printa and keep on going. He caneven print the entire check with the magnetic ink. It is identical toregular toner, except that it has magnetic particles in it which cannot beseen with the naked eye. There will corne a tinre when the forgerconsiders rnaking docurnents that require color. These are not muchdifferent than any of the other items he will be creating, and aside fromthe colored parts, they will be printed in the same way. Until that time,the colored parts of the docurnents can be printed by any local printshop. This is what they do for a living, and the forger is just anothercustorner unless he acts ffierently. The idea is to get the colored partsprinted hrst, so there is really no way for the print shop's employees toknow what the hrushed product will look [ke. Partiat printing is doneall of the tirne by these places and it is not a big or costly deal.

The forger can purchase a color printer to do the color printinghimself, but should keep in mind that an InkJet printer is not a LaserJetprinter, and won't be adequate. The diffiuence in results is tm great forthe forger to use anything but a LaserJet for color printing, so it is a loteasier to just take a certificate to a printer and have him do the workone wants done. Another big ffierence is cost. A decent color laserprinter is almost fir'e or six thousand dollars more than an InkJet. Thefor,eer can avoid color if so desred, and it wdl not cost much in lostillicrt gains, but the desire to use color will eventually present itself, soat least he should knorv the method to use.

Most of the paper the forger wili work with can be ordered in therequired colors. Black ink is the standard, so the forger should stick towhat can be purchased already flurished, until he is ready to experinrentand waste a little time and money. There is more of a challenge in doingdifficult jobs. and it can be a good motivator to get to the nexr skillIevel. There wiil be plenty to keep the forger busy, and rhere will also

Page 30: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter Six

Gening Started

zl

be an occasional setback. There will be no situation that cannot besolved by using one's head and sorne creative talking, so the forgershould look forward to the task and be ready when it arrives. There isno one to conffadict the forger or his actions, so he can offer anycredible explanation and it will probably be accepted. No one will knowwhat the forger is creating, as long as he acts like a nornnl custorner. Ifthe forger complains about shoddy worlg he can expect the sarne

response as any other custorner. None of the many documents floatingaround out there are particularly hard to reproduce (with the exceptionof cash, which is nnde on very unique paper). Once a forger has

followed these procedures and fabricated docunrents a few tinres, itbecomes readily apparent how simple the process really is.

What is really needed is sorne practice and a few easy-tcgetdocuments to work with. The forger can start with a birth certificateand sorne car titles. He need nrerely order a clean copy of the title to hisown vehicle from his state's Departrnent of Motor Vehicles, or his birthcertificate from the Vital Statistics Office of the state in which he wasborn. The docurnents will not be used in their original forrq so theforger can start with his own or a friend's. Once the forger has scannedthe fornnt into the computer, any necessary information can be deletedor changed. The forger should use new, or at least wrinkle-free,paperwork to copy frorn, because the scanner will pick up the snr,allest

imperfections and reproduce them on the duplicate. When a documentis scanned rnto the computer, the forger should not forget to do thebackside as well as the front. It is often necessary to do both. and allthat is requred is putting the paper back urto the scanner. only upside

down the second tinie. This will take a little getting used to. but practicemakes pert-ect. The forger will be using the cut-and-paste process on

the computer u,hen working on the documents. so he must remembernever to chanse the original copy. He just makes additional copies ofthe original frle to work on (and make mistakes utth). Once the forgerhas what he considers to be the right setup on the screen, then he simplyprints it and sees how close he is to gening it nght. A light table willallow the forger to place one copy on top of the original to see how toalign it correctly, but it can also just be held up to any light. Once

Page 31: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

28

again, it's the forger's project, so he must do what he wants to in theequipment department.

It is nearly impossible to thoroughry descnbe the complete process.surce each computer, or set of prograrns that are being worked with,wiil be drfferent. The forger can follorv the computer's insfructions, andit will take him through the steps better than the rnstmctions in tlusbook ever could. The forger can make ail of the mistakes he wants toon a computer screen, since it is easy to delete any imperfections thataren't desired before the hnal copy is printed. Most systems todav havea "help" program already built into them. All one needs to do to ask forhelp is to place the mouse's arrow (the cursor) on the Help ndtcatorand click the button 0ust as is done for all of the other funciions). Thismay seem complicated. but it really isn't. By the tirne the forger is atthis stage of the work he wrll already' know how to do tlls. If the forgerstili needs some assistance or explanations. he can call a computer storeor service and ask for guidance. A professional conrpurer traiirer will beglad to conrc over and provide one-on-one uxtruction. for money ofcourse. The newspapers and specialized local computer-orientedpublications are full of ads from individuals and businesses offeringthis service. and they will show the forger how to properly operate theequipment. Nothrng that the forger is doing will ron-' out of theordinary, rf he tells the trainer that his intention is to open a deslcoppublishing serr,ice. It the instructor knows thrs up front. the forger cancall and ask for furrher assistance rn the future, and the trainer willalready know hrs needs and be able to herp over the phone. The forgershould definitely de'elop some r\Tre of rapport with an urstructor orknowledgeable person, so that help is availabre for future projects whenneeded. If the nainer comes to r isit the fbrger and examines thecomputer flrsthand, the forger can more easily leam how to do what iswanted on the setup at hand. Thrs is another reason ivhy an offrce is agood inr estment. The forger should practice with these documents untilhe is sattst'ied with the results, and then it,s his ball_eame.

The forger can try some stocks and bonds for the minimal cost ofsome low-r'alue paperwork. Most stocks and bonds are printed on thesame t)'pe of paper. so the forger practices with the cheap stuff to see if

Page 32: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter SixGetting Started

29

he is capable of fabricating false docunrents, and whether or not he istruly interested in this line of business. ln reality, it is simple to forgealmost all of the docurnents currently in circulation, but the forgershould choose docurnents that nreet specific needs. That should be keptin mind as the forger practices his trade. There are more specific detafuas to the actual duplicating and use of docurnents in a later chapter, butat this stage in his developnent the forger needs to learn how to dothese procedures until his work is acceptable and usable. If it takes theforger more than a week or two to aftain the needed skill level,sonrething is wrong. The processes of this rade should all be picked upin a day or two. Forgery isn't all that hard to learn. Tuning up a car ismore difficultl

The forger can receive instructions on hov'to operatehis computer in the privact of his ffice.

Page 33: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter Seven

Checks

31

Checks

If one intends to nnke money in this business, then one can getstarted by mastering the creation of realisticJooking checks, or the"rubber check scam, " which is relatively easy to do. This is the perfectplace for the fledgling forger to srart. The leaming is quiclq and thepayoff is good. I will skip discussing personal checks; they have littlevalue unless the forger wants to improve his wardrobe or perhaps buysorne trinkets. This is generally inadvisable, as it shows his face to a lotof people who will probably have to pay for the bad checks they accept.Most likely they would be minimum-wage working stiffs who haven'tgot a chance in this world anyway, so the altruistic forger should _arvethem a break and stick to more impersonal targets, such as banks andthe cash they provide.

Millions of payroll check are cashed every week and no matterwhat the opposition does to discourage the creation of fraudulentrmitations, they are stilI the best game in town for quick cash. Payrollchecks and refund checls, both of which are eas)' to get and to workwith, will be discussed later in this chapter. There are a few things thatare consistent in this type of worh and the process wrll be reviewed tomake sure that they are understood. There are always variations, butsome things remain the same, and it's those constants that will bediscussed.

Page 34: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Frauds And Other Crimes Of Deception

The first thing is cashing the checks. ln order to cash as rumy as

possible, the forger must hrst set up the places ahead of time. Localsupennarkets and bars will cash some of the checks, but the majority ofthem will be cashed at the branches of the bank where the perpetratorhas opened accounts. When the forger intends to do this work in a

partrcular city, he must hrst open up as many accounts as needed atdrfferent banks around town. Different narnes can be used if so desirec,but unless the forger iltends to make this more than a one-day affair, a

single name will usualiy suffice. If the forger plans to complete thework over a periui of severai days, using multiple bank accounts, thentwo or three nanres should be used. That sort of planning is for anadvanced job. and for now I will be explaining the single-day version.The advanced version will be easily understood once the basics arecovered and the process has been fully explained. When the forgercashes the checks. he will be going into the bank and simply depositingsome of the money into his own account and then walking out with thedifference. The forger will be doing this in as nnny bank branches as

tinie and distance will allow. It will take one business day toaccomplish this task, and that is the time franre that needs to beconsidered when the forger lays out the route he will take from branchto branch. I use a map of the city and a well-planned route. After all,time is money.

When the forger opens up accounts at the various bank branches, hewill need to depostt at least a grand into each checking account. Thiswll allow the cashier to look at the forger's balance when he is cashing

checks. and ascertain that the check will be covered if it does not clearthe other bank. This is what the cashier looks at when a custoffier'saccount rLformation is displayed on the computer screen while he isstanding there waiting for his nroney.

One tfung to be aware of is that if the bank puts a hold on theforger's account while it waits for the other check to clear, the forgerwill not be able to cash any more checks in that bank's systern Theforger is screwed if he does not have another backup bank system tofall back on. This can be prevented from happening, and it's importantthat tfus matter be handled correctlv. The cashier will do her thine and

Page 35: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter Seven

Checks

JJ

then she will inform the forger that she will have to pur a hold on thecheck until it clears the bank it is drawn on. This is a normal bankingoccurrence, and is not a cause for alarrn It is then that the forgerinforms the cashier that he does not want any holds put on that account,and because of that will just go to the bank that the check is drawn onand get it cashed there. The forger acts friendly while saying this, and its@Ins nornal to the cashier. She will be glad to accommodate thisrequest, and will hand back the check. The forger must never leave thebankwithout the check or cash, unless finished with the scarn

Another thing to be aware of when opening up a New Account isthat the New Accounts representative will call a service that suppliesinformation to the banking industry concerning new-account requests.

Through thenu the New Accounts representative will verify that thenew depositor did not leave any other banl<s hangrng with bad checks orother debts. TLus is not a problem for the forger. because he will beusing ID that has never been used before while conducttng business.Tfus is the phone call that the New Accounts representative alwaysmakes while the new depositor is opening up the account. The bank hasno way of veriffing the Social Security number that the new depositoris using, as this serv'ice only uses its database for checking on newaccounts. If the information that the new depositor is supplying is not inthe service's database, it will say "OK."

One problem that might arise is easily dealt with. It will conre in the

form of the New Accounts representative rnfornlng the forger that she

has been told by the Veri-Check service that he has opened up anotheraccount at a ffierent bank that day or the preceding da1,. If thishappens, the forger sunply infornx her that the other account is a jointaccount with a lover or housemate, and that he wants a separate one forhimself. This makes sense, and it answers the question that the NewAccounts representative is required to ask whenel,er this sort ofsituation anses with anyone who wants to open a new account. It is herjob to ask the new depositor to explain the situation, and once she has

an answer that makes sense, her job is done and she nroves on. It is herjob to open up new accounts, not chase offpotential customers, so theforger should relax and be ready for the question lf it is asked.

Page 36: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Frauds And Other Crimes Of Deception

The forger sometimes obfuscates his fingerpintsby applying super glue to his fngenips.

Another important point to renrember is that law enforcement can get

fngerprints off of a check with very little effort. Each time the forger

handles a check or deposit slip, he is leaving hrs prints all over therrland fingerprints stay on paper for a long, long time. This also holds true

for all of the documents that the forger will be handling in his other

endeavors. The forger must never forget that the other team has vast

technology and resources, and to remain free he must practice self-

protection at all levels of his business. A rough physical description orpoor-quality photographs are ver)'little to go on. and most banks won'teven have that to supply to rnvestigators. If the forger cannot wear

gloves, which rn most cases is not an option, then fingerprints must be

covered or altered in another way. A simple trick that has been used foryears and never fails is to put super glue on the swrl of the fingerprintof each finger. SuDer clue is durable. and when used in moderation is

Page 37: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter Seven

Checks

35

alrnost invisible. It is unlikely that anyone will see it on the forger'sfurgers, and it will stay there until he decides to take it off. These twoaspects of the glue make it an ideal method of eliminating this threat tothe forger's success and freedom. Sorne brands work better than others,so the forger should find one that works for him and get a supply of itfor his crime kit, as altering fingerprints is a precautionary rneasure thatshould be taken all of the time.

All checks are intended to be read by a magnetic reader at somepoint. When a forger prints his own checks, he must print them with anMICR in the printer. It is a must, and only a fool would not use it andthen try to pass the checks. One can print the entire check with themagnetic cartridge, since the rnagnetic ink and regular toner are thesame color and it is difficult to tell the difference between thern Whenthe cashier takes the check from the forger at the bank counter, she runsit through a small device called a reader. This device scans theinformation on the bottom of the check and transfers that information tothe computer screen in front of her. This is a tinre-saving device, but itis also a security device. When it doesn't work for her, she will enterthe information by hand, but a red flag has been raised in her head. Shewill continue to service the custorner, but a signal has been given tosomeone else by a key stroke she rrnde that the custorner did not see hermake. The forger can usually talk his way out of these situations,because the check is not reported stolen or missing and everything looknormal, but I would not want to make myself known to the bankpersonnel for the few dollars at stake. It's the danger of this sort ofconfrontation that makes using stolen or poorly printed check a badidea.

There is a handy device that makes check fraud a linle easier. Thisdevice is called a check protector or check writer, and it is the machineused to emboss the amount of the check in color across the "Amount"section of the docurnent. Most people have seen a check embossed thisway before. Check that are embossed in this manner are nrcre readilyaccepted in the banking world than those that are not. It's mostlyhocus-pocus, but it worls very well, and that is all that really mafters inthis game. One brand narne is Paymaster. New ones can be purchased

Page 38: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Frauds And Other Crimes Of Deception

36

at most office-supply places, and used ones can often be found at

second-hand offrce-equipment stores. They run about 9150 new, butused they cost much less. Unlike the paper and the printer, a check

protector leaves an embossment that is unique to the machile, so the

forger gets a new one for each city that he does work in. That way he

does not leave a trail.Computer-generated signatures are very common these days, so the

forger creates a hle in his computer's rnemory for saving any official-looking signatures he comes across. He just scans and saves them forlater use. It doesn't matter which name is used in the signature space,

as he will never be cashing checks at the bank that they are drawn on,

and there is never anyhing to try to match. The whole idea is to make

the checks look as professionally prepared as possible. The forger isgoing to be dealing with checks which are drawn for large amounts ofnpney, so there is a certain amount of scrutiny to be expected.

There are various ways to carry out check fraud, and the first one

that comes to mind requires nothing more than opening a businessaccount at a bank and then cashing the checks the bank provides atffierent banls as if they were the forger's own paychecks. Thisnrethod works fine, and it has only a few restrictions. They are few, butvery important. I do not do this type of crime any more, but I used toand I never got caught, so I guess that makes rrte an expert on the

subject. There are a few items that the forger needs to deal with in thisparticular scanl and it can be done with great success once the concept

is understood.

This scam has a realistrc limit to the amount of funds it can return;about ten or ffieen thousand dollars. This is by no nrcirns chumpchange, but it can be multiplied nany times with a little plaruring and areasonable investment of tirne and rnoney. It can be tried as a

confrdence-builder, but the second nrethod, discussed later, is better-

suited to making bigger rrroney with less risk or hassle.

1. When the forger opens the account, he deposits at least a gand,but not much more than two. Since it will be in cash, too much willlook susoicious.

Page 39: bitify.com · Created Date: 10/18/2013 4:51:42 PM

2.

3.

Chapter Seven

Checks

5/

A business license is not always required, but since they are easy toget and cost little, having one enablss the forger to carry out thiscrirne conectly and with fewer questions.

The forger must insist that the check numbers be started above1000. This is essential in the cashrng of therq as low numbersreflect a new account to those who know checks. If the forger tellsthe New Accounts representative that he wants them because hehas been writing checks already for tus business and does not wantduplicate numbers, she will accept that as a valid request andusually grant it. If not, go to a bank that will.The tbrger will narne his company sornething professionalsounding. It will not mafter to the bank but it will matter to theperson cashing the check. Coloratlo ProfessionaL Senlces suresounds better than Bob's Jobs. doesn't it? Inrpression is everything.The forger will never cash the checks at the bank or branches his

account is with, until he is ready to get lxs initial deprsit back andend the scam.

The forger tells the New Accounts representative that he prefers topick up his new checks at the bank instead ofhaving them mailedto him.

The forger uses the addrass of an existin-s vacant building or a mailbox for his business address. Bank personnel often know the cit-v

well enough to know the addrsss he might use, so makin_s one up isa mrstake.

A cellular phone is cheap and u,onh the cost. Thev can be rentedwith a small deposit. The banli rvill call the lbrger's businessnumber with a lanre excuse. but it is really a verillcation tool that isused for checking up on hrm. The forger ans\\'fl's as if it were a

business. or uses a voice-nressaging service. but a phone the bankcan reach him at is a must. Plus, if there is a routine problenl thebank wrll always start the research with a call to the forger. This is

an early-warning device that can keep the tirrser out of jail, so he

considers it cheap insurance.

This scam has a one business-dav lil-e span. so it doesn't Dav to get

ereedv.

AT.

5.

7.

6.

9.

Page 40: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Frauds And Other Crimes Of Deception

38

10. If possible, the forger uses a bank that lets him bank by phone orissues an ATM card to nnke deposits and check balances. Abusinqss account usually does not let the forger withdraw fundsfrom it, but the card and phone functions allow him to makeperiodic checl<s on his account throughout the day, so that he cansee that ever)'thing is OK with his account and ensure that it is safeto enter another bank. Plus, sorne of the deposits the forger will bennking as he cashes checks wilt be credited to his account, and hisbalance will increase. If the forger's balance has increased to thepoint where he will be satisfied to withdraw it and call it a day,then he should qet a cashier's check and exchange it at a coin shopfor gold that can be converted back into cash later. This allows himto get a large amount out of the account at one time in a normalfashion. If the ATM machine keeps the forger's card, or a

telephone call asks him to talk to a bank representative tostraighten out an account problerq the scam is over and the banksare the last piace he wants to be.

(Some bars and supermarkets wrll cash smaller checks after thebanks close, but the forger shouldn't exp€ct a great deal of success withthis ploy.)

If the forger doqsn't want to open hrs own business just to get sorne

check, he can steal sorne flom an existing business. This is notrecommended. but it is an alternative to getting them drectly from thebank that can be utilized in an emergency.

If the forger-cum-burglar does choose to get some checks from anexistrng business, there are a few things that might make the deed go a

httle easler. First off, he shouldn't take them from the checkboolq butshould instead take the extras rhat are kept in a box fiom the bank. Ifthe for-ser does take checks from the checkbook he should take ones

froni the bottom of the pad, wllch will hopefuil1' not be missed for awhile. The forger can still cash such checks at his banh but ifthe bankcalls the business to verify funds. they will most likely be reportedstolen, and the scam could end before it begins. The forger can act likea bank and just call up the bank the stolen checks are drawn on, and

Page 41: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter Seven

Checks

39

find out whether the check will clear or not. If the bank says it willclear, the forger knows the checks have not been reported as stolen atthat tinre. This is not a real good way to conduct check fraud, and thepenalties are the sarne for the bad sc.uns as the good ones. If the forgerwants to do a scam that uses existing business accounts, then he canuse the followrng method. It is actually a very good way to beat thesyster& and it's very low-risk.

There are two versions of the following scanL but they differ only inthe way the first check is acquired. Once the forger has the masterchech the duplicating and cashing are pretty much the sarne for both ofthem. In essence, the forger op€ns accounts at different banks andcashes as many check as he can in the time allotted. He could do oneor both of these: thev are easy to do. The forger will need to get a

master check lbr each nrethod. The rrean,s to go about duplicating andusing them wili be discussed next.

The lrst method requires that the forger obtarn a check flom a

currently open business account. Diggrng through garba_ge is a goodway to get such a check. If the forger's locksmithing skills are up to parwith the rest of his felonious dreams and aspirations, as they should be,then it's really a srmple natter to go into a business at night and removea single check from the back of the master check-bmk or the boxes ofcanceled checls that are always around sornewhere. He could obtain acanceled check rf he has the option. That check will have informationon it that can be used to make the for-uer's work a little more difficult todiscover. The for-ser can delete the portions of the canceled check hedoes not need when it comes trne to rvork with it. By,. saving thesignature in a file. the forger can use it on the check he pnnts later toadd a convincm_e finishing touch. In reality, the signature wrll nreanlinie. but it is a touch of professionalism that I carnot resist. The forgermust keep in mind that this is a lifestyle. nor a hobby, and alwaysrernember that basic tenet as he struggles to improve ius criminal skills.

One of the advantages of burglarizing a businass to obtain a mastercheck is that the forger can look at the companr, checkbook and see

what the balance in the company account is. If the forger gets into theoffrce with little or no evidence of his entr.v, his visit will go unnoticed

Page 42: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Frauds And Other Crimes Of Deception

40

by the employees. If the forger has to leave traces of his presence, then

he can make it look as if his intentions were to do sornething other thangetting a check. If he takes a canceled check and leaves the rnaster

checkbook alone, the business has no reason to call the bank concerningthe check. If the forger makes the disturbance look like the work ofkids or anxateurs, the cops will probably just write it off as pettybreaking and entering. If there is a good balance rn the checkingaccount, the forger's efforts will be well-rewarded if he covers histrack.

The forger should focus his efforts on a complex of "ExecutiveSuites" where there will be a number of ofhces containing checkbook.His goal should be to find several business accounts with _sood balancesin thern, and then setup his operation to make use of those businesses inhis scams. The object is to confi.rse or nuslead the police and businessowners about his objectives. If the forger removes a canceled checlg orone that was in the extra box, he has a grace perid of at least a week.

He should use that grace tinrc correctly. The "Executive Suites" areeasily found rn newspapers' classified sections, and most high-riseoffice buildings have a floor dedicated to them. It is not very expensiveto rent one of the suites for a phony business. The forger can even use

one of his bad checks, if he rents on a Friday; it will not clear the bankuntil the following Monday, and if the forger tinres it right, he can add

an exfra day by setting up on a holiday weekend. If the forger rents an

office, he will be gir,'en a set of keys to the building and the alarm setup(if it has an alarm systenl as rrany places do thase da1,s). The potentialis hrgh for a good score if he rents an offrce and takes Lus tinre going

through the other offices. The forger will have manv hours to do his jobif he _eoes late at night and leaves in the early hours of the morning. Hecan get what he wants and be long gone by the time the variousbusinesses rn the Executive Suites lurch into action on the next workday. The forger can even call the landlord back and inform him that he

has changed his mind and does not wish to rent the office after all. Theiandlord might bitch, but if the forger did a good job of clearung up

after himself, he need never know that the forger was in the buildingagarn after the hrst time he spoke with him there.

Page 43: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter Seven

Checks

The forger sometimes resorls to burglarT to obtain business checks(and computer equipment) v'hich are essential to his schenrcs.

The above-rnentioned rnethod is by far one of the best ways toinitiate a check-fraud scam. It allows the forger a chance for a goodscore, and the risk is quite low in the preparation departrnent. If theforger's locksmithing skills are not as good as he would like them to be,a locked building late at night gives him plenty of practice time and noaudience. Even if the forger is a novice at picking locks, he wili besurprised at what an hour of undisturbed practice will accomplish.Loompanics Unlimited publishes two excellent books on this subject,

41

Page 44: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Frauds And Other Crimes Of Deception

42

The Complete Guide to lnck Picking and Home Worl<shop

Professionnl Lock Tools, and there are nufirerous other books, videos,

lock-pick kits and devices, and mail-order courses available to the

forger who wants to hone his lock picking skills. ln addition, it is agood idea for the forger to familiarize himself with the literature onsecurity systems, just to be on the safe side. (Of course, it is always

best to get information about these matters from professionals and

experts, and if possible, the forger will do this. If incarcerated, he willtake advantage of the situation and augrnent his education in the

clandestine arts by leaming from acknowledged professionals.)

Most office buildings have suspended-tile ceilings in then! and it israther simple to Iift a tile and enter an adjacent room through the

ceiling. A hand-held dustbuster will do a marvelous job of cleaning up

the little white particles that drop to the floor when the tiles are

removed. They are a dead gveaway that someone has messed with the

ceiling, so the forger must make an effort to clean them up if he enters

offices in this way.

A second nrethod of obtaining a master check is also very effective.

Most people would never even consider this as a nrethod of acquiringcheck to do fiauds wittu and that makes it very desirable and not oftenthought about or defended against. This is my favorite rnethod of doingcheck fraud. It is not only virtually risk-free (as far as getting the

check), but it also guarantees that the funds in the business account willbe sufficient to allow the forger to withdraw ali that he wants, and I do

mean alM have made over a hundred grand every time I have done

this, and with no problerns at all. The preparation work is the key, as itusually is in most crinres of rntelligence. The forger must take his tirne

on this one, and if he does, his efforts will usually be well-rewarded.

The basic idea is to get a refund check from a local, very

recognizable business. Then the forger duplicates it in its original forrrland cashes it the sarne way he would cash any of the other checks he

does scams with. The telephone and local utihty companies are the best

sources for refund checks; they are high-profile, and almost all of the

businesses in town will cash their checks for the forger. Once the banks

close for the day, the forger can hit supermarkets and bars until they

Page 45: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter Seven

Clrccks

lLa

close, too, because the checks actually have to arrive at the bank theyare drawn on before they are canceled. If the forgu does this scarn overa weekend or holiday, he can have several extra days to work with.There are plenty of cities that have 25 or 30 different locations of thesarne supermarket chain, and probably several different supermarketchains as well. If the forger combines all of these placas with the bankbranches that are open on Saturday, he will have more praces than hecan possibly go to as well as plenty of options. Teiephone directorieswill inform the forger which cities are ripe for this kind of opportunity,and if he goes into the supernnrkets that he intends to visit later withforged checlcs, he can usually sign up for some type of progran thatenables him to cash checks there more smoothly. This is where theplanning part of a job is important. The forger can make several years'worth of income in a few days, so it is essential that he take his tirneand do it right. The penaltl, tbr failure, of course. is lengthyincarceration.

Since each of the checks the forger will be cashing wrll appear to belegally and actually issud anybody who wishes to inquire as to theirvalidity can do so and receive a verification. when a clerk calls acompany about a chech he does not say that the supermarket is cashingthe check and that it wrll be deposited along with the day's receipts. Theclerk rnerely asks if the check is good. The company they are askingsunply tells them yes or no, as they do a hundred trmes a week for all ofthe other places that call them about other checks. It's unlikely thatanyone will call to verify the check but the tbrger needn't *orr' if thishappens; it will all be fine.

There are countless ways and places to get checks that *.iil do thejob for the forger. but the followrng ure a few of the better ones. Anyrefund check will do, but the idea is to get big onas. so thar the forger'sscore is as large as his efforts can make it. He can also do this withseveral smaller checls at the sarne time. The variations are up to theforger, once he knows what the businesses whrch cash refund checksexpect.

l'he forger can go to the telephone companl and give them theaddress of a vacant house he saw along the u ar.'. He can say that he

Page 46: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Frauds And Other Crimes Of Deception

AA?+

wants service and all of the options he can think of. The idea is to havethem charge the forger as much as possible for installing a telephone, so

the forger says that his credit is terrible and he is planning to make lotsof long-distance calls. He pays them in cash and hits the door. Theforger comes back the next day and informs the telephone company thathis arrangements for the house fell tlrough, and that he wants hismoney back. The telephone company will tell the forger that he willhave to take a chech and that it might even take a day or two. Theforger doesn't make a big deal out of it, but calmly informs thetelephone company that he is living in a hotel until he can find anotherplace, and doesn't want the check mailed. He gets a number to call anda person's name u'ho can tell him when the check is ready for him topick up. If the fbrger does the above at a telephone company outlet at amall, or another business that also sells telephones. he can increase thecheck amount by buying a phone at the same tirne he arranges forinstaliation and then just lettrng them include that refund with the otherone. The forger will do what is necessary to obtain the check in theamount he desnes. When the forger considers that every dollar that headds to the refund check wrll be multiplied by the number of checks hecashes, it is obvious that a linle turns into a lot quickly.

The same rnethodology applies to any refund check the forger wantsto do this with. The utility companies are also good places to initiatethis process, because they are well-recognized and everyone knows thattheir check are good. If the forger has a hearr of stone and the balls tomatch. the IRS retund check is the gold meiial of check-fraud crirnes.

It's more than monev uhen the forger takes it from the govemment, butso are the ramifications and the payback. There is vrtually no way toauthenticate a governnrcnt check and no place to call and verify itsowner anvway. The holes that are cut into them are for later use, so the

for_eer just cuts sorne wth a square-hole cutter (available at any office-suppll' store) and he's in business. The forger can cash these checkeveryu,here. and they will probably be paid by the idiots in Washingtonto boot. The fbrger can create his own version of a government payrollcheck if he wants to. These checks have many different formats, dnd .

many businesses wrll cash them. The forger realizes, if he stops to think

Page 47: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter Seven

Checks

45

about it for a moment: How would anyone know that these checks areforgeries? None of the banks will know, as they obligugly cash themfor him.

Now that the forger has the master check to work with, he can slartthe duplication process. It is really no more than just scanning the checkinto the corrputer and playing with it until he is satisfied with theresults. The paper the fbrger prints the checks on is not really all thatcritical. since it is reaily check paper that he is using, and the color ispretty much standardized. The main objective is to create an authentic-lookrng check. the numbers on the bottom of it being the most criticaldetaii. The whole process should not take the forger more than a coupleof hours to master anyway. The scanner will transfer the company logoand the other details that make the check look authentic and original,but the forger u,ilI need to have the computer change the checknumbers so that each check has a different number on it. The forger'sQuicken program should have this feature on it, and he mustn't forgetto use it. On a oneday job, or when using refund checlcs, differentnumbers won't matter, but if the forger is creating regular payrollchecks, the advancing numbers iue a must if the scam is planned to runfor several days.

Things the Forger Must Remember

o He must be aware of his hngerprints.o He might be observed entering and exiting his car. so he should

keep that rn mind when he park it.o He must be aware of ATNl-machine canrcras. and not oark within

ther view.

o He must always check lls accounts with the ATM card or viatelephone. so that there are no surprises.

o The ATN4 card might be kept by the machine. so he mustn't let hisfingerprints be kept with it.

n He must dress for the part, as this is businqss.. ' A check protector is a major plus in this business, so he must use

one.

Page 48: bitify.com · Created Date: 10/18/2013 4:51:42 PM

a

a

Document Frauds And Other Crimes Of Deception

46

The MICR must always be used on checks"

Mail boxes don't have rnemories. He must use one. and never have

things mailed to a friend's place.

He mustn't push his luck; there's always another day and another

town.

One final note: The forger needs to make himself aware of the

economy in the locale he is working in. This helps himdetermine the amounts of the checks that he will forge. Inplaces where the economy is strong, the amounts can be larger.The forger must be aware of how the checks appear to the

clerks at the banks, markets, bars, and other locations where he

cashes checks.

Most banls have what is commonly known as a "tellerlimit." It almost never exc@ds $1.000. and a teller limit of$500 is not uncommon. Checks for larger amounts require a

supervisor's approval. A simple phone call made with suavityand decorum can easily establish a bank's teller limit. Theforger always stays under that limit.

Tellers ordinarily assume that if a customer is depositingsome of the money, the check is legitimate. The forger shouldact like a business person who is in somewhat of a hury, yet ispolite and friendly. A comment such as, "At last I'm gettingthat used jet-ski my girlfriend has been asking for!" sometimesgreases the wheels ("used" means that cash is required for the

transaction). "Forgot my checkbook thrs morning. so just giveme hundreds for most of it, but I will need several hundred intwenties, tool" is also helpful. Tellers deal with dozens ofprofessional people every day, and thel see patterns and

corrrmon characteristics, so the forger must look and act the

part if he is out to cash large checks. Otherwise, he should stickto blue-collar-sized checks.

The forger must always act like a regular customer,

behaving normally and expecting fast and courteous service.

Being too nice or too mean is a dead giveaway to an

experienced teller.

Page 49: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter EightStock Certificates

47

Stock Certificates

Doing stock fraud is another relatively srmple way of turning paperinto rnoney. There are several ways that this type of fraud can deliver a

good return for the forger's investrnent of tirne and rnoney. Adiscussion of two plans follows that will open one's eyes in this area.One plan has short-terrn requirernents that will yield ttnee or four timesthe forger's investrnent, depending upon the city he chooses to use andthe number of banking systems it has. The second plan requires that theforger set up and maintain a nnre elaborate scarn, but the retum issubstantial if he has the patience for it. Both of these operations willtake an investment of the forger's tirne, as well as at least ten thousanddollars of start-up money. The first scam takes a week or two. whrle thesecond one requires at least six months to do properly, and it can lastfor years if the forger wants it to.

The first nrethod is pretty snaightforward, and the amount that theforger can make really depends upon the number of banks or hnancecompanies that will make him a collateralized loan. The forger willneed to establish a residence, so if he iuranges to share a house orapartnpnt with sorneone whom he contacts from a classified ad, forinstance, it will be a lot easier than setting up his own place. The forgerfinds someone who works days, and by doing so ensures that the forgerwill be able to stay honre during business hours and answer the phone

Page 50: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

48

calls from banks and loan companies. When anyone calls inquiringabout the forger, he just assunrcs the role of the person they want totalk to: landlord" employer, reference, etc. The forger gives the inquirerinformation that corresponds with what he wrote on his loanapplications. Who could do a better job of playing the pleased landlord,impressed employer, or well-connected business acquaintance that allcreditors want their debtors to have? The loan-verification workers whomake the calls are seldom the pmple who the forger was talking to inperson, so voice recognition is usually not a problern The forger needs

to get a cellular telephone that he can always carry with him. The nanre

he uses to initiate cellular phone service is unimportant, but he will need

to have voice mail and rnessaging so that he can leave an answer

message that implies a business where he is employed. Later in the

scanl the forger will need the cell phone for a drfferent application thatI will explain. With these bases covered, the forger should be able toprovide a residence and a piace of employ'nrent for the banks and loancompanies with which he will be doing business.

The forger's nanre will not be listed with the credrt burear-r(s) that the

lending institutions check with, so he will need to come up with a

believable story. For irsLance: he just arrived back in ttus country afteran absence of at least five or six years. Mexico or Europe are goodplaces to have been, but Canada is not. The forger must remernber thathis task is to be helpful, iurd since he is aware of hrs credit limtations,he will be glad to provide collateral for his loan in order to ree.stablish

his credit and get his new life started. The forger w'ants to project the

persona of an American citizen who was recentl)' divorced from a

person in Mexico or Europe or wherever, and has moved back to the

good old USA to start over. If the forger offers the lending irstitutionsstock as collateral, they wrll usually be glad to loan him about 75 or80Vc of its face value. If the forger talks with banks and loan companies

before he buys any stoclg he can have all of hrs questions answered

before he commits to anyone or anyhing connected to this crime. Thisis also a good way for the forger to determine just how much he stands

to make on this scan! and if it's worth his tinre and trouble. Some

locations are just too much ftouble to do crimes in. I cannot explain

Page 51: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter EightStock Certificcttes

49

why or how thrs happens: it just does. If the forger isn't happy, with theway the situation is developing, he should move on to another place thatfeels right.

The forger will not have to provide the lendrng institutions with anystock information at the moment he talks to them. He just tells them thestock's approximate value and fus immediate flnancial nee&, so thatthey can calculate the loan information and tell the forger what it willtake to make him the loan. Once the tbrger has taken care of all of thepreliminaries and has a person to deal with. he can then set some stockand duplicate it as many trmes as it takes to satisfy all of his loan-requirement needs. The forger wiil be selling the original stock back toa brokerage when he is done with it, so he mustn't get it confused rviththe fake stuff. Stock is created and distributed front many locations, sonothing is ever identical. and the industn' depencis upnn the numbers fbrverification of authenticitl,. If the fbr_ser settles fbr tabricating stockcertificates that :ue 97Vo correr;t, he will be frne. By the time the loanofficer has the forger's phony stock certificates on hrs desk most of thepaperwork will already be done. At this point, all the loan offlcer willdo is call and verify the documents. He will do this in rhe forger'spresence, since it would be wrong to ask hint to surender thecertificates until the loan is made.

The certificates should never leave the forger's sieht untli hc: has theloan. They are not just worthless pieces of paper. and should be treatedwith respect. Since the forger purchased the initial stock legaliy. u,henthe loan officer's call is made for verifrcation. it will corne back as OK.The lending rnstitution has forrns and procedures for notiflng theSecurities Exchange Commission (SEC) of the forger's joan. so rheonly information that the phone call will supply is that the stock isgd. It does not nntter how many lending institutions cail to rerify thestock; the only answer they, will get is "yes" or "no re_sarding iSauthenticity. The forger can teli any story he u,ants ro atxlut its origin.or his possession of it, since the time frarre of one's o\\.nership of stockis not public knowledge. Srnce the forger has requested a normalservice from a lending institution, his loan wiil be just another day'swork to a place that requires a steady supply of borrowers to remain Ln

Page 52: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

50

business. once the loan is made to the forger, the certificates he gavethe bank will be put rnro a file and forgotten until the borrower pays offthe loan or defaults on it. If, at any tinre, the forger feels the need topostpone the disco'erv of his fake stoch he need only continue to makethe loan payments. Stock certlilcates corne in a variety of sizes andshapes, so the lbrger just buys several different sorts until he finds theone he can work rvith and reproduce well enough to use. The forger canalways rqseli the ones he does not use to a brokerage later. This isreally a lot srmpler than it might sound, so the astute forger will notdisregard this possibility too quickly.

The second rnethod is more complicatd but as usual, thatcomplication is the reason for its greater reward. This scam has thepotential for millions, and I have seen it done to the tune of $25 millionin Denver in 1986-87. The forgers did not have the technology that isaround rtxlay'. and the-u- had to do it the hard way, but it was donesuccesstuLlr'. The neuspapers tiom that tinre uill provide the story, ifanvone is urterested in a view from the outside. The inside view of thisnrethod is grven here, to better explarn how the forger doas it on asmaLler scale. There is virtually no way to prevent this type of setup, soits life span lasts until the forger runs out of sheep.

The objective of the forger in this instance is to acquire the ecrucationand information necessan' to open his own brokerage rn order to sellthe phony certificates that he creates. This actually requres a lot less',rork than it sounds like it does, and the new stock buyers that areentenng the market on a regular basis supply all of the custorners theforger will ever need for tir-rs scam. The major drfference with this planrs that the forger wili be requred to lie face-toface to many people; youknon. sort of like a pnast or a poiitician.

ii the forger looks in the nant ads of most bi_e newspapers, he wilprobabll' find an advertisement that reads along the lines of ,.Wanted,

StocJ: Broker Trainee, no experience needed, wrll train on the job."These sorts of ads are always rn the newspaper because the turnoverrate is ren,hrgh in this businqss. Most comrnercial brokerages arealways lookrn-e for the ambitious few who will make a career out of thisprofession. The fbrger need only dress for the part, and he will

Page 53: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter EightStock Certificates

5l

probably be hired by the frst brokerage to which he applies. Thebrokerage will spend a few weelcs naining the forger in the "how to's,"and then he will be given a desk and a set of directions for locating newcustomers. The brokerage will show the forger how to sell stock andffeate new accounts for investing other people's money. As soon as he

feels competent in this skill, the forger takes ali of the nformation thathe can with him ancl says his good-byes.

,\Iost rrrajor nev)spapers cary adt,erTisements for entry,-level positions insecurities and stock brokerages, and the forger sometintes nnkes use of

tlvse positions to learn the necessary skills for his endeat,ors.

The forger linds and rents an office that will aLlow him to duplicatethe operation he just left. His ersatz brokerage \\on't be as large, butthe concept will be the same. The forger won't be hring anyone until heis up and running. He doesn't have to hire anyone at all if he wants to

HlgffiJ

f, ,1i.;iqi"*.lflll'.i?,rffi [tl:::,f#ffi 'f'n

g+iiir *r.,:"'i $' rilr #T $$#'iffi ff #*;dil). . v^rk Ctty 1u1.r""""- , n.^^" 9rr(J Sal:ri)*i1l!e Wtlh ri't *ilo'*icoBoLl\ | securniesl SfOCf BR0KERAGE

' lJ..' ti^Hi k*t s1i s6r 1 s e l, t%l:!i I u{lt',t*.1 ?,. ii,,[.f

i,:s"fi:iJiifl;,u,'on, &' lrT€!iii,y,:!qt11!$;li:T.:

* ip;.iutito^.,o\noe(s (c\ren',iser I SECURITfES

,; ?y_llt"q,.i;;*re

(G/1. €tc ) tt'l

I ogn*o;''tt broker. No ree

' i,on sp€c,drrsrs ,o, indicatino { I n5f .ffi$']*ddl,i;d1'd,!t-

Page 54: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

52

do it by himself. The whole operation is less complicated if the forgerdoes it on his own, but after he has been at it for awhile his enhancedconfidence wll probably convince the forger to hire a couple of rookiesto do the work for him. The idea is for the forger to do just what he didat the real brokerage: cold-call potential customers and sell them stock.Cold<alling is less complicated than dealing with establishedcustonrcrs, because most new clients are not real famrliar with theprocess. They will accept the forger's answers to any of the questionsthey might ask, and lus inexperience will not be noticed. The processfor finding new customers that the forger learned during his brokeragetraning will oftentrnres surprise him with the results he gets. It'sactually quite srmple to sell this stuft'. and the profits are pretty high,too.

The .forger: "There's one bont even, ninute... "Hisprey: "\Ye're gonnamake afoftute.t This gut reallvArroxs his sn1ft!"

/t-\:\I. /',.)#i -st I..-l ./)\"Y;"

Page 55: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter EightStock Certificates

-3

Once the forger has convinced a custorner to buy certain strcI<s fromhirq he then buys a share of that stock and duplicates it as many timesas he needs to in order to frll that order. There are various other piecesof paper that the forger will need to create, but they are really justconffacts and receipts, and are easy to fabricate compared to the otherdocuments he will be forgrng. The forger's sales will be made over thephone, so he will have the time required for making the new stockcertificates. The forger just tells the client that the stock ceftificates anddocumentation can be sent via a nrcssenger service, or can be picked upin person by the client the next day. Either way, the forger is notexpected to have the stock certificatesjust lying on his desk as soon as

he makes arrangernents to buy them from the exchange, so a delay isnormal and expected.

While the forger is training at the brokerage, he steals one of theirlicenses from the wall and creates one for himself, along with a fewdiplomas that will look good on his wall as well. The moreprofessional-looking the forger's office is, the more he will corne acrossas a good investrnent to his clients. The forger should also request, inwriting, a list of the licensed brokers in the state in which he's working.This list is commonly available in the industry, so the forger just asks

sorrreone while he's working at the brokerage. They might even have a

hst there somewhere that the forger can copy. The forger's plan is tolocate several brokers that are in other cities. and use their ID numbersto do business when a number is required. Most of the transactionsdone in this business are done tlrough messengers anlnvay, so theforger can always be pretend to be an employee of another brokeragewhen it suits the situation.

If the forger ever has a problem with a client concernin_s his stock ormoney, he offers to buy the client out on the spot with no loss to himfor the trouble. Not only will the client not be able to find another deallike the one the forger is offering, but if he ever does decide to sell out.the forger will be his fust choice, and that is what the forger wantsan)'way. It keeps the forger's business separate from the world outside.and it remains his secret. The forger lets it be known that hisbrokerage's reputation is to always offer is clients a befter deal than

Page 56: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

54

any other firm will. By doing so, the forger is always aware of his

clients' actions, and can make his getaway if need be. Word of mouth isa comfinn rnethod of getting business, so if the forger treats adissatisfied custorn€r with kindness and quick refunds, he will get

custorners from places he didn't even know existed. The forger mustalways remember that this is a game of illusion. He needs to play by the

rules that allow him to win, or else not play at all.The game plan is for the forger to sell phony stock until he has the

arnount of money he wants, and then split. It's a pretty srmple concept,when one thinks about it. There is no need for the fcrrger to complicaternatters by worrying about things that he cannot control. The physicalpaperwork that the forger actually provides his clients just sits in filingcabinets anyway. There is no one to examine it and tell the client that itis fake, and it is not sornething that one shows to friends or carries

around for the sake of bragging. I own plenty of legitimate stock, and Ican't recall ever showing it to a single person for any reason. It's preffymuch left alone once the initial trarsaction is complete. This is one

crfune in which the product is not handled by very many people, and the

ones who do handle it are not expa'ts in its manufacture. There are

small variations in all printed docurnents; just look at money. Mostpeople do not know enough about stock certificates to spot fraud, and

would be embarrassed to show their ignorance anyway. If there is ever

a major problem, the forger will be the first one asked to resolve it. Hisfrst indication will be a call from the SEC or one of its agents. Theforger stalls the caller with a lie and packs his belongings. He might nothave gotten what he wanted, but he got enough to know how to do itbetter the next tilne. The wily forger smiles. waves good-bye as he

closes the door behind hirn and doesn't look back.

Page 57: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Clrapter NineTrusr Deeds

55

Tfust Deeds

Even the narne of this docurnent is cause for concern. When oneconsiders that most of the people who deal in trust deetls are crooksthennelves. the idea of defrauding them is almost funnr'. It's evenfunnier when one realizes that the ultimate goal is to trade a rnrst deedfor the only other document in circulation that bears the word "trust" onit: the dollar bill. Both of these pieces of paper are used to represent thepromise of sonrething requrnng trust on r,()rlr par1.

A trust deed is a piece of paper thar represent.s entire of plfiialownership in real property. Real propert), can be def,rned as dir1. r^, ith orwithout a structure on it. The concept represented here is that the furgerwill duplicate *us simple document and sell or borrow against it Theprocess for verifying the authenticitv or ownership of this sort ofdocument is verl'easily defeated. and that makes it a prinre target forcrinres of fraud.

Deeds are bought and sold by the tens of thousand: ererv businessday in this countr-v, It has beconre such a conttlrcn transaction that theprocess has been reduced to a task of extrerne srmplicitr. If verificationof ownership is desired, a phone cail or a visit to the local count)'courthouse is all that is needed. He makes a note of the address he rs

interested in, as well as another one that is close by. The forger theneither goes to the country recorder at the courrhouse himself. or obtains

Page 58: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

s6

the services of a service which handles such chores (using a false name,

of course). By asking fbr information on the nearby address. the forgereluninates any record ofhis search for the address in whrch he is reallyinterested. They wrll all be on the same piece of mrcrofiche, which are

small sheets of hlm on which many pages of mrcrocopied informationare recorded. The infbnmtion under discussion is recorded according toaddress. So, since there are multiple addresses on each sheet of filrn the

forger (or the service he employs) leaves no record of requesting any

information for that particular address. and thus reduces the potential

number of people who might recognize or remember him later, when

they are questiond by the authonties. A1l that the tbrger or the service

has to do is request an address from the country'' recorder. and the filmwith that infbmration on it is made available. These are public records,

so there is no fuss (or even ID) required to see them. If the forger or the

service wants copies of any of these documents, he just asks and theyare provided to him for a small charge.

In this scam the forger can only double or triple his investment, butsince there is little nsk of losing his investment. the amount he puts upshould be substantial. The basic concept here is to purchase a validdeed with a fair+o-middling market value, and then to resell it to as

many drfferent buyers simultaneously as the forger can line up. He willreseli it with a loss of 5 to 107o, but that is the profit margin the buyersare lookin.r fbr. so it is negotiable.

The fbrger looks in the newspaper's classified ads and hnds a deed

that fits his needs. and then buys it and records it at the courthouse. He

then places a classrt-ied ad offering to sell it. and makes calls to people

ri'ho adverlise that the)' buv deeds. It is pretn' commonplace for people

rihojust acquired a propert)' to try and resell rt. Lots ofpeople invest inreal estate and then find thenxeives in a situation that requues quickcash. If they have to take a loss to raise the needed money, then so be it.Ther cln always write off the loss on thelr income tax retunis. so itreallr isn't a loss to smart businessmen. It's just a business deal and

nothing nrore. The newspaper's classified ads are full of pmple who are

looking tbr deeds to buy. The forger calis up some of them and asks allof the questions that he wants answered in order to make himself

Page 59: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter NineTrust Deeds

57

cornfortable in doing this scam. when the forger has the informationthat he needs, he starts trying to sell his deed. It's OK to have as manybuvers ready to buy the forger's deeds as he cnn line up; it's nodifferent than selling anything else. Dates are very important in taxstrategres and divorce settlements, so the forger's need for a certain dateand time flame for the close of escrow is commonplace and wil raiseno eyebrows. The forger makes duplicates of his paperwork, and hashrs appointments set up accordingly. so that they all go down on thesame day. one-trvethree.

Since the forger will nrost likely be gettin_e paid with checks, he willhave to have already set up accounts to deposit them. If possible, thetbrger asks that the buyer leave the Pay To The Order portion of thecheck blank; this is not an unusuai request. There are often agents andpeople sellin-s property for others. so leaving part of the check blank isnot unheard ot. and the forger needs to try hard to get his buyers toaccomm<xiate this request. This allows the fbrger to take the check to alocal coin or gold shop and conveft it to something he can use. Thechecks the forger gets will be large ones, and the bankin_e svstem in thiscountry makes getting sizable amounts of cash out at one time verydrfficult and often rmpossible. If the forger is forced to accept checkwhich iue made out to hirr\ then he just goes to his bank and has themexchanged for monev orders that he can exchange for something else ofvalue. The forger only has a short trme to convert these checks, so hemust plan his moves arcordingly. If the forger does plan on convertilrghis check to _eold he should make arrangerrcnts a day or tuo ahead oftime with several _eold suppliers to assure that they can do it rvhen he\\ ants to. These places will sell the forger all of the gold he wshes tobu1'. regardless of the amount, but they need advance notice to do it.They will call the bank or take the check there to renf, its vahdity, sothe forger should expect them to do it, but since the check is real, it isno problem. The possibility does exist that the forger can just endorsethe check that is made out to him over to the gold dealer. It is no bigdeal, really, and if the forger just plans his acrions thoughtfully,everlthing will work out.

Page 60: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud

58

And Other Crimes Of Deception

4Tk MCOrNC }'@ TO

F d id PM'd.r R.+., of

Df,ED OF TRUST(For use n he aote of Vxhtnglm only)

Tlls DlEIrOf nUST tud. ds &\ oi

,GINOR.

Bl'wCNY,

*:JYrrianl hLd E.b\ k8am slls Md onvs ro TtrlG u @ qS Fw oi s[ k a.iio!D8 &bE,*:p,oqr r Coury, Wahqld

Ases$. r h(r Tr\ tudLA@ut Nunkr

*h'rh.al tr,td . rr ud @Lpdr\ io. @.dd or fru3 t)@, rwbd ud dl Sc ffic, kdIF6drJ,pnd.ll,l&. h," d kdr( j..sro *ton8Bg.r tr u, *re aj]@S, d d. rqE, rlsG, d raE s6di

llr dccJ '\

lo, k t.ry orFqng FhlrM€ oiac5 g6di.aturr hdcudtu4 edtsFdr ol$. iu ol

",.,..,, ";,r;;s ffi"-@,f#,:1-*.* * *;'1L,'di!, d,J rll rm.r.L) md'6-!ons rd.xr.sroN kdl el Jr trh Md s@ a dt & dv|d or i(d b!

pr. tog.Sd |il r'..n k6n !r sh 6r.a dl F 'gd

rr,

" proL<r dr r.6r] oids IEd of lN cdor@vtuE d 96

l" iei $. p,otsnr m Bd @drue md rW, ro @r do rd. l}ftl ro @p1.8 uy tuldq, tuN. qnn'o!.r.rL tng bu r oi ablr ro * buh $dd. to rcn4 @pl! &! ndq, tu@. s mFvaML bstr*h,ri rir t tuaBci ., J€*o!d &d Io .mple {S nl bs (:|M qi!!c, ovtrb, dlB d

'.)ur!on. !ldrrg D. p..Fdr

: lu F\ *rJ'. r.,riJdr al atriJi bxes Md s*s66 !f S. j]ilr r.. t4 S. l@ &d d cla oan rid.har3.s rc: ! !r .i.ibrr-.r nFLmg rh. sur- oi hs k oatri:

i i o rc.r aiL bui3L.8s i," :r r.:.nd ddrd on k pr(B dsd [..i @nsuoNly Na |@ 16 b, t. d6 $. rod &bt sud br ds k rr TM Al FLcr6 Nl * *i: .\ j.

a.L.r,,,o mJ E !r sL-: .-;r,.r i $. b.ficrry uy.rov. d $t. s tsFbl. aN ro d. ki:rs s sril.,er n'!i rpp IL sobr olldb :lle e, LMe Flrcy oy b .FLd rr u\lLd.brdess h.'cb! suA .r sdri trrrd d rh. kficra tul drtu Ssb .Flquo br & kn.s d Bd.ddr d{onun@c. ol M\ p.lEJrr! L r-'dLe dtr M oilN b r..ar cf frdllff.. dl n8b! of h hld s:,buuLe pLdcr s.n m tot€ tui ia r d. pu.Illg !r S. foElos. e.

I . i.rcdJ e! ldron or pr(ld,ne ris8 ro det & ff ry h@i d * aS!6 q F6 of hcnr6 G id6Jir!F!dll!oi5atcrFMs sriu*:losr.aldcshmd.norFia€[email protected], r..ri,3 diJ !i 4\ iu,r b.ou$r b\ Bdk L. s ro leald 6sH oiTni

Trust deeds vary from state to state. An erample ofWashington State trust deed is .Ehovtt ort this and the .folloving page.

Page 61: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter NineTrust Deeds

59

, lo Fr allr!rb. a-i mJ.rlfuj s &Mduoi tr1$ hs LH.tTd u.L!@ S..W of d. Tr ru.r ! tf t !rLL3ar ri Rrd f c.b! rJ lturd ! trJ

'ncm.i\ fd lddl! Dlud, a pm$Jd b\ s&tur.

r SL!. J (dnru ia, r. F' rnm Jde tui, u!.s Asmots. rrlllilk prmwr l'tr f,.mbM6 or odd.tu3.rJ.and B.n.n.,n ru\ ts\ $. sd. dJ S. sour $ F,J q$ srd6r il $. nr. *r

riutr.u.DLfrr.rdh-rl, nrllIrJJ-rodrJ6m.!SolS.&brsudrUlrMof Trul

I I l\ IlrXlril L! AaILFI) nlAT

. :lc :r.^r.r Jd r-rtr!., rl .r r. rd1. L:. trrFr\..!dd f! rjr5 id o TLlr t. d. r,i -!!d 6d.ri oiil.e Ik,..s rr lfn i!rh.!oi :41..obi33:'i RUd rJ *.no rqu. i

r.,.,,(!J...iJ:r, ur.!c..4: a-,. LicrB! Isr.dd'nd.(

f , Lnf .;,n b. F\n4r .ri M\ hd.bdcs sud hd.b\ or m dc Ftulfur .l s! agerdr! ,,!r, r!.f cJ [o.b\ ri;

'jmd3(.Ly hm. du. MJ rvrbl. il s. otlon oa d. h.6:]n b | 4l

,q!cn "r B.n.irL6 lrune t&L s I d. trd proFf, rn dorba liS S. lH of I tuL ar'.1,j | :1.. . !rlrir f.j dr plLl , du.oon h Lr. hr8h.n hrdJ6 tu\ Jmn .xqr ln6re tu\ brJ .r lNres elc ItuLd,r,.rI!U,tI:,i4;,rilreiea5rolr,"\ ,rrod..rl*orS.str$Jdng"@MbL.lMesidDd'nom.r)r.. : rrrr.hlrsJ!!nyluclh\$L!lr..1.iirrn aiJil d.s4lur Itd\,dlkdshburdros.l@ndlid

! ur. cv.nr ail\ rnr.. .r rh. p..@ , dd or (llru3ddsrr o, ldrd F)n!r. a mr slsN he obrLseb.i

:E l.:d ]d.i::].!14.

)*

ir@C?r. -r.. .? .usl.rrdtu. r'r1 Lr i.r.,!ui..Lrn.1r.in.+ld!.J r r,I rc u: !.j:r rir in rn.Ls.\ anJ p,rys.s mmr ood Ln

_ i rr: -ri ,,:.i:: , ..r.r$lin.a t.rrd !-.ri- s :r.\r,r, sili frrrn j dc nr.ita3. ra.rI ra br

Lii tr rcircr srdr i:l Nw.^ dldrc ongra tune jt. turd j r.i of elrn rr : :r., r;.Lrr. i.:.,, r !.rJ!rB lrc u,Jr dl od- iEJ or TNr o' of 4 erroil or Fr(]dmg L. snirb ardo' :.rr- rr:i.:. . J $r r! 3 F! m!\, iurh rf r!r f' rreJ'ng 6 broqhr b\ S. TNre

t ll,.! lEcJ.r intrt atp:'er ro tri,u.! rJ f. &n.ar oi ild rs bmdne nor od\ on S. Fi.s hq.ro bur on dcr [.tr5dLi dsrF Dr rm Bo.a.rn tutt m{ b. hotdd sd o*nd of Uk ntr

sucJ hcrh\ q[ed'er !i r!r,un.J 3r Ben€ i.rr^ tden

.' ]v {: au b rllFld

Trust dced, page tw,o.

Page 62: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

60

The forger can also borrow money against the property from severalbanks at the sarne time, if he sets it up so that all of the loans happen onthe sarne day. He can also borrow money against the properly and sellit to another person or two at the sarne tinre. The options are many; theforger is the one doing this, so it's strictly his call. The forger figuresthat the paperwork involved with what he is selling to people is a

relatively slow process, and 24 to 48 hours is a good tirne franre towork with. The forger is not breaking any laws until he actually sellsthe deed to npre than one person or banh so he should get comfortablewith his garne plan before he makes his move.

!20,00r-!i,t00'ut0 I %TJro5r.ooiJf,ifr-t j --;;:=--_-t---

o-iior,,iffiFASrm|lwe Make ;*#"J:lii#..#T[1, #;##nn0 Dpcisi611sl ''",,^:F.-^^?:?i;i.nq,riit= il: iiifriE:" 'lvin

Lend 0r

lf E rYrqr' i tr'uATEjFl; --fl,:l;t:'i;.gg,$'!'rifl--.r

-T h e D e ci si o n s I -' -6:1^;Ui tiiri; = [ i i#,u'l;*-Smg

ur^ l arrl DAln Enp irlen^Frcu irtcT,fteiWe Lend PAID.FOR NEEb CASH FAST''ft''

ttrel,tonev :+?[i'oirortot-- .^ff$Tl;lili:'qH0UR APPR0VA!-,gry&*:: GUARANTEED *,,., *

N+ -."r,jj,]r[l^i,!',** lt

1

t n n11 1 dE*

^d**i,{-'/ffi[$"--ffitf#,",83.8!':1:Y? = i-#'l:,:l?s.,J.t#l,.IJ.

The forger need merely look through the newspaper to find nurnerousadvertisentents placed by those vho offer to pa1, quick cash for

trust deeds, mortgages, contracts, and other ne,qotiable inttrutnents.

Page 63: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter NineTrust Deeds

61

As a second twist to this tlpe of plan, the forger can assume the

identity of a person who has equity in a property, and then sell orborrow against that equity just as in the above-mentioned scam. A1l ofthe information that the forger needs in order to do this is available atthe courthouse in the paperwork for the propefty he is scamming. Theperson whose identity the forger is assuming might also have otherproperty recorded there, and this can provide the forger with lucrativeinformation. The forger can find a property that suits him by looking atsome of the frles from a good neighborhood. When he finds a propertythat he likes, the forger just files a notarized (by him) second or thirddeed of trust at the courthouse and he is in business. There is nomechanism of notification to the owners of the property on which theforger files the second or third deed of trust. He must make sure thatwhen he provides the county wth an address at which he will receivefuture papenvork concerning the property, that it is not the same

address as the property itself, and then the forger wrll have covered allof the bases that might hurt him. The actual owner will most likelynever know that the second or third deed of trust has been filed. untilthey are eventually notified by the person who lent the forger money. Ifthe forger tells the lender that the property is a rental, the lender will notbother to notify the people living there of what is going on. There areliterally hundreds of potential lenders of money in every city, and they

exchange iittle, if any, information between thernselves. If the for,eer

never discusses any other busiless with the people he meets. thev willnever know that he is doing business with someone else, and the forgerwill run little risk of crossing hinrself up. This is not a difficult crune,

but it is a professional one, and if the forger treats it as such. he can

make out very well for his tirne and trouble.

Page 64: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

64

QUITCLAI}I DEED

THIS QUITCLAIM DEED, Execured rhrs da! of 19

by first pdy,

whose post offrce address is

to srcond pdy,

whose post office address ii

WrTNESSETH. That rhc sard ilril !s\ i..:^oo.l c, r,rJcrutron enJ fr)r (he sum ofDolltr\ lS parJ L t)-::.1:J ic..n.i aifr\. th. rccclpt whereofrs hcrebv

acknowledgcd. does herehv remrse. relca-,e and qurt;larn rjnt. lr. i3jJ ,.Jlnj irifil Ii,re!cr. all !he rrght, !jtlc, rnter,est and clum *hrch the sard first Fan\ has rn and to the i,.ll(,!rrn! J..,.i1..J rrr.r ..a l3nJ. an.l rntprovemcnts andappunenances lierelo tn the Countv of Sr:rr ;rt to wl!:

N \I'ITNESS WHEREOF, The said llrsl pffy has srfned and sealed rhc\. pre,enl( thr cav and ver firsrabove wri(ten. Signed, sealed and dclivered in presencc of:

Str c of WmN SrSnalure of Flrst Pd\

nme ol Wltness I)art nime of Frr\t Pan\

Signature of Wrtness l!n3ture of Flrst Pany

nt ndc Itrnt name of Frrst Pan!

SEb ofCounry ofOn

I

before meappeaEdp€rsonall) known to me (or proved to ne on lhe basr\ of sarisfactory evidencct ti l-,! ife lerson(s) whose nme(s)ivde subscribsl to the within insmmenl anJ aJkro* iedged to mc that hclshe/the\ c\.:j:.,J L\c same in hts./hcr/theirauthonzed capaciry(ies), and that bv hrvler.'nerr srEnature(s) on thc rnstrun.'r: i:::.r\on1s), or the enuty umnbehalf of which tie pe.son(s) acted, exe.ut.,l m. jnstrument.\!T|NESS my hand and official seal

Signalure of Nour' ..\i:nt Known_produced IDTrrecflD =_-.=__-

(Seal)(R.v'e! l15

There are many foftn of quitclaim deeds. Tw,o are depicted on this ondthe following page.

Page 65: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter Ten

Quitclaim Deed Fraud in a Nutshell

THIS INDENTURE, made the

-

dav oi

BETWEEN (the name and address of the person executing thedeed), party of the first part, and (name and address of the person towhom it is given). party of the second part.

WITNESSETH, that the party of the first part, in consideration of(indicate the amount) dollars. lawful money of the United States paidby the party of the second part. does hereby remise. release andquitclaim unto the party of the second part. his heirs and assignsforeve( ALL (here the actual interest of the party executing thequitclaim deed is to be stated and the land described relating towhich this interest exists)

TOGETHER with all right, title and interest, if any, cf the party of thefirst part in and to any streets and roads abutting the abovedescribed premises to the center lines thereof.

TOGETHER with the appurtenances and all lhe estate and rights ofthe party of the first part in and to said premises.

TO HAVE AND TO HOLD the premises herein granted unto the partyof the second part and his assigns forever

lN WITNESS WHEREOF, the party of the first part has executed thisdeed the day and year first above written.

ln presence of :

Witness

(Signature of grantor)

ACKNOWLEDGMENT

Next, the forger needs to find a suitable property, and since there

is always a chance of failure for some unforeseen reason, the

skiilful forger often does this scam on multiple properties, usingdifferent false identities on each so that even with a high failure rate

there is a real good chance of success on at least one of the

properties. If all of the properties pan out, then the forger needs to

set the closing dates on the loans or sales of the properties for the

same day, so that all of the business can be accompLished in as

short a time frame as possible. This provides an opportunity for a

clean escape before someone files the new deeds. and the action on

the property falls under scrutiny by the courthouse staff, whose job

65

Page 66: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

66

is keeping monthly track of high-ticket real estate transactions for amyriad of bureaucratic reasons that have no relevance here.

Once the forger finds the desired property, he notes the addressand one nearby (as explained in the chapter on trust deed fraud),and either he or a service he employs goes to the courthouse andrequests the information on the nearby property by merely asking aclerk whose job it is to supply such public information to all whoask for it.

When the forger has found the right set of circumstances on aparticular property, such as a low to non-existing debt, and/or anowner who lives out of town or state, he simply writes down all ofthe information, and makes a reasonable facsimile of the owner'ssignature as a reference. since the false signature will eventually bediscovered, it is not necessary to reproduce it perfectly. It isbecoming more and more cofirmon for one's identification to berequested when asking for property information from thecourthouse. By not specifying the property, and not askrng for anyphotocopies of the documents but instead jotting down the pertinentinformation, the forger reduces his risk of exposure even further.Many courthouses have some sort of video surveillance todocument events that might be needed at a later date, and thesedevices register time and date, so the professional forger doesnothing that will identify him to rhe camera, such as askrng for aparticular address or copies of information pertairung to aparticular address. There are crime task forces (especially in largercities) which have the specific mission of investigating document-fraud crimes, and they are frequently very _eood at their job andknow all of the tricla, such as checking the tapes for obvious andoften-overlooked mistakes wllch are made by foolish or carelessforgers.

All of the information that is needed to falsify a quitclaim deedcan be written down, so there is no need for the astute forger to everbe remembered if he is careful in his actions. The professionalforger knows that he can begin his search dozens of addresses awayfrom the actual address he desires to learn about, and that bv

Page 67: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter Ten

Quitclaim Deed Fraud in a Nutshell

6'l

asking for copies of different addresses on the same segment ofmicrofiche film, he can further reduce his risk.

Once all of the needed information is acquired, the forger need

only fill in the blank quitclaim deed, using information thatcorresponds to his false identity, and have the document notarized.A phony notary seal is no problem for the forger, and since thenotary seal is an accepted form of authenticity, the forger alwaysuses it, even in states which do not require it. The appearance of anotary seal has a way of reducing stress or anxiety on the potentiallender's part, and is the mark of a true professional.

The forger will also fill in the information on a blank appraisalform by taking the name and amounts from the microfiche andusing the actual appraisal company's name. Thus, when a potentiallender is checking the information for accuracy, the company thatdid the appraisal will verify the forger's appraisal over the phone,and the ma.tter will end there. The potential lender will not need torequest a copy of the appraisal that will have the owner's realsignature on it instead of the forger's version that the potentiallender has in the loan package.

The concept here is to eliminate all of the originai owner'ssignatures and replace them with the forger's versions, so thateverything looks the same on all of the necessary paperwork. By thetime money changes hands, there will be at least three or moredocuments that will bear the forger's version of the owner'ssignature, so they all need to be taken into consideration and

replaced if possible. The good news for the forger is that they are

actually easily replaced.

Once all of the paperwork is complete, the forger then goes to thecourthouse and records his new quitclaim deed. For all intents andpurposes, the forger now owns the property. Once the deed is

recorded, the forger can do all of the things a real owner can dowith the property, such as sell it or borrow against its equity.

Page 68: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

68

Appraisal forms vary, but this and the following pagedepict a commonlt used version

Page 69: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter Ten

Quitclaim Deed Fraud in a Nutshell

69

UN]FO8M FESIOENTlAL APPBAISAL BEPOBI

a;, t'.

Page 70: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

70

As there is a growing awareness of this type of scam, the adeptforger knows that to ensure that there is no speciar service offeredby the county, such as notification to the owner of any and allaction taken in regards to his or her property, he merely asks theclerk if such services are available, as if he is interested in takingadvantage of it to protect his own property. He will then know if heneeds to take precautions to make certain that this process iscircumvented before initiating his scam. To bypass or beat this newand poorly handled notification systenL the professional forgersimply calls the courthouse'and has a clerk change the notificationaddress and/or telephone number in theh records, as if the realowner has changed residency or telephone service. When the forgerbegins his scam, the mailing or phone call from the courthouse willgo to the destination specified by the forger. Not all counties offerthis service, but the forger covers his ass by requestrng this servicewhether it is in place or not, and thus further reduces his liabilityfactor by a notch. Some counties simply place a written notice inthe owner's file that will not be discovered until it is too iate for theforger to stop the wheels that he has set in motion, so this is animportant precaution for the 21st-century forger to consider.

Many potential lenders will require a walk-through of theproperty they are considering accepting as equity for a loan, so if itis an income property, the forger will act like a potential lender andmake a walk-through himself, just to see how the tenants willrespond to a potential lender's appearance at their door asking for alook inside. If there is a problem, then the forger has time to eitherabort the scam at that address or do the walk-through with apotential lender at a time when he knows that the problem will notarise. The lender is at the mercy of the owner in this business.because he needs to make secured loans in order to generate profitsand stay in business. The forger reaLizes this, and uses tllsknowledge to manipulate the lender into doing thrngs the wav theforger wants them done. He sets times and conditions that thelender must adhere to if he wishes to please the forger and make theloan.

Page 71: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter Ten

Quitclaim Deed Fraud in a Nutshell

rI

Many tenants do not like any type of intrusion, and telling a

potential lender that a walk-through is not possible is not onlycorTrmon, but easily accepted, as long as the rent roll records andappraisal are already provided. And in many cases the rent rollrecords are not required, because the owner does not wish to makethem available to anyone, and the loan is based solely upon thevalue of the property. But the lender knows that there is an incomeon the property, and that has a positive bearing, whether the actualamount is disclosed or not. Lenders will always expect to see someform of the property, be it a photograph, drive-by, or walk-through.If the property is undeveloped land, a photograph of the surround-ing properties is always a big plus for the forger, because it showsthe potential lender the condition of the neighboring properties andoften replaces the lender's doing anything else besides looking atthe photographs. The forger will have a number of photographstaken from the property at different angles, just as a form ofprofessionalism, as well as a courtesy which makes the potentiallender's decision easier and quicker.

The forger can readily make himself aware of the current trendsand nuances of the ever-changing real estate business by merelyacting like a real buyer of a similar property, and having severalsellers or lenders give him a list of the required documentationwhich is needed to secure the property. This is an easy way for theforger to acquire a list to work from. The information is there if it issought correctly.

Page 72: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter ElevenVehicle Titles

IJ

Vehicle Titles

Duplicating and passing automobile titles is not only very easy, but itoffers a good retum on the forger's investrnent of tirne and money. The

forger should have the equiprnent and the knowledge to use it by this

stage of the gane, so he will move on to the actual acquisition ofvehicles to sell or borrow against. The idea is for the forger to have the

'vehicles in his possession legally, so that he can show them to any

potential buyers or bankers whom he intends to do business with. The

forger cannot go out and hot-wire a few vehicles to use, or buy stolen

ones. Those methods are a dead end" and should never be considered as

an option. Getting good, clean, legal vellcles to work with is reallyquite easy if the forger uses his head and employs a f'elv well-placed

lies.

The best method of obtaining the vehicles the forger needs is to rent

them from one of the big automobile-rental agencies. Thel' have the

best new, low-mileage, fully loaded cars and vars around, and the

forger gets to pick the ones he wants... what could be srveeter than that?

The forger will need a credit card to facilitate the rentai process, and

several cards will make it even easier. If the forger does not have acredit card that he can use and then lose. he uses the npthods described

in the bonded credit card section of this book (Chapter l2). The forger

x'ill also have to use and lose at least one set of ID. and possibly

Page 73: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

'1 A

sevetral, dryending upon the extent of his caper. ID and credit cards areused in almost all types of worh so the forger must becorne familiarwith their acquisition.

The forger's frst step is to obtain and duplicate some titles. Thenaster title needs to be new and wrinkle-free. The forger can apply toany state for a new one to work with. All he needs is a paid-for vehicle,and it doesn't have to be new or even in the forga's narne. The forgerwill need the title for only a few minutes, and information such as thenarne and address of the real owner will be changed once he has itstored in his computer, so the title's origin is unimportant and will notbe revealed. Each state has its own version of this docurnent, so theforger can use any one he wants to, and should probably use several inhis endeavors. once the forger has a title to use, he scans it into hissystem and rernoves all of the unwanted information, such as all of theinformation on the title that is not printed by the state. If the forgerstarts with a blank title, all of the information that he types or signs onthe new one will look original. The forger will match the paper andprint a batch of blank titles for himself. He doesn't have to be exact onthe paper match, but he should get as close as possible. Regular toner ishne for car titles, and a noiary stamp from the same state as that whichissued the original title is also needed.

The forger is ready to get started. He takes his credit card to thearport and rents hinself a car or van. The forger tells the rental personthat he would like to pay cash when he returns the vehicle, so he wouldappreciate it if they would wait until he returns the car to collect therental fee. The rental agency will still run a verification check on theforger's credit card, but they won't reduce his credit limit on it, and thatwill allow the forger to use it over and over again, even with a relativelylow credit limit. Lots of people ask for just such a courtesy, and mostrental agencies will be glad to do this. The forger rents the vehicle on aweekly basis, because this will give him plenty of tirne to do his thingand not have vehicles that have been reported stolen parked nearby.

Page 74: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter ElevenVehicle Titles

. The forger can find a multipliciry* of vehiclerental outlets at any tnoior aimort.

The forger drive.s the vehicle to another city and state and park it ata place that he can work out of safely. Any other city and state will do,

as long as it also has a big airport. The forger leaves the vehrcle at theplace to which he dlove it, and goes to the airport to rent another newvehicle from another rental agency. He drives the second ciir back tothe city where he started, and parks it at another secure place. Theforger knows that there is no heat on him or his actions, so he takes histirne and does it right. He goes back to the frst arport and rents

another vehicle from a third rental agency and drives it back to the

second city. The forger repeats this procedure until he has all of the

cars he wants to work with. He can use the same rental agency if he

wishes, as there is no reason to deny him a second vehicle if he desires

to rent one. These vehicles are worth fifteen to twenty thousand dollarseach, and the forger's retum will be 75Vo of that amount. so he doesn't

75

Page 75: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

to

sweat the outlay of cash to set this up. It will cost the forger a couple ofhundred dollars per vehicle before he is done, but he already knows theexpected return, so laying out the money is not stressful.

The forger sometimes t,isits an autonnbile dealershipin order to purloin a sales contract book.

The reason that the forger went to different cities to obtain thevehicles is simply a precaution, but if he can add some confusion to theother team's anticipated pursuit, then he does so. The vehicles theforger will be getting from the ffierent states will be recorded in thosestates' respective Departnrent of Motor Vehicles computers, so bytaking the vehicles to a second state the forger can avoid a hassle whenit comes tlrne to register the vehicles in the name he is usrng" Mostautomobile rental agencies register their vehicles locally, so the forger

Page 76: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter ElevenVehicle Titles

just checks each vehicle's license plate, and knows for sure if he has

succeeded in his goal. The forger is not going to be selling the cars as ifthey are stolen, so not only does he make more money per vehicle, buthe does not have to act like a crook or do business with any. Thismethod takes a little tirne, but the results are worth it, and it's virtuallytrouble-free. One of the major pluses of dealing with cars which are

stolen by this method is that the forger is never driving a reportedlystolen car, and he will always have either the rental paperwork or the

legally issued registration with hirn The sawy forger doesn't confusethis type of work with boosting cars or joy-riding. This is by no means

small-tirne crfune, and if caupht in this act. he will be dealt withaccordingly.

Continuing onward, the forger goes to several autonrrobile dealer-

ships around any city and gets himself some sales contract books thatcar lots always have just scaftered about in those little offrces that theyhave. If the forger goes to several dealerships, the chance to pick one upwill eventually present itself. The forger ask a salesman to let himmake a telephone call to find out when his wife will be getting to the

dealership. This is a conunon sort ofrequest, and it puts the forger intoa room with a desk and, nnst likely, sorne of the contract books. If the

forger carries a briefcase or sofite such contrivance into which to putthe purloined contract book, ttp petty theft will be easier. The forgermight want to acquire these confact books before he rents the vehicles,

since they are preffy universal except for the dealership's narne on the

top. The forger can use any of them for any of the cars, regardless ofthe car's make. If the forger cannot get the contract books from a

dealership, then he goes to a car lot and tries to buy sorne of them froma salesman there. The forger tells the salesman that he is selling cars

out of his house, and needs sorne contracts to help make the sales go

easier. If the salesman will not sell the forger any contract books, he

will most likely be able to direct him to a place where they can bepurchased. Sonre office-supply outlets sell ffierent versions of this

type of contract. If the forga can find a place that sells them this way,he just uses a r)?ewriter or a rubber stamp (one can get them made at

many places) and puts a business nanp on the top of the conffacts. A

Page 77: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

78

name on the top of the contracts makes them look better when resellingthe vehicles, but if the forger is doing everything the way he is supposedto, it is not that funportant in the long run.

The forger fills out the blank contract and title with the correcrinforrrntion about the vehicle. The vIN (vehicle identification number)is on the dashboard or the dmrjamb, and the rest of the information onthe confact is pretty simple to figure out for himself. The forger willalso need a regular type of Receipt Book for making out a phonyreceipt for the fansaction of buying the vehicle from the origrnaldealership. He uses a cashier's check as the source of payrnent, sincelarge amounts of cash are suspect in most transactions of this arnount.The numbers or the narne of the bank can be anything the forger wants.He would not have the vehicle if the check were not good, so the forgerdoesn't worry about that angle. Most transactions of this amount willhave the following: a sales contract; a title; a receipt for the original saleof the vehicle; and the registation the forger got from the state when heregistered the vehicle. The forger will simply create all but theregistration, and that will conp from the state in which he is legallyselling the vehicle. If the forger puts the sales tax afirount in the correctplace on the sales confact, he can avoid having to pay anything whenhe registers the vehicle (except the regisnation fee ofusualy less than ahundred dollars). Ifthe forger needs the tax amount for the contract, hecan call any dealership in that area and they will tell him the amount hecan expect to pay when he buys a vehicle. The forger wilt call as nunydealerships as it takes to get all of the information he needs for thecontracts; they are the best source of current information, and whendoing fraud crirnes it is always advisable ro use the most reliablesources of information possible, If the forger acts like a potentialcustorner, the dealerships will tell him anythin_e that they think mightrnake him corne to them for a sale. This is an important source ofinformation, so the facile forger will make use of it.

Next, the forger goes to his state's Departnrent of Motor Vehiclesand regrsters the vehicle under one ofhis fake nanps, Ifthe forger actslike a person who is doing this service for the owners of vehrcles whoare too busy to do it themselves, he can have the wrong paperwork or

Page 78: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter ElevenVehicle Titles

79

not enough paperworlq and the clerk will just tell him to go and get

what he needs and return later to register the vehicle. This method ofregistering a vehicle allows one to make mistakes that are covered bythe excuse: "This is all that the owner gave tne. lzt mz call or go andget the correct informntion for you, and I will return later." Theforger can nnke all of the mistakes he wants and not raise any

suspicions. The service that the forger says he is providing can be abusiness or just a favor for a friend, since both are done all of the tirnein the regisradon of vehicles and other rnatters that dernand a long lineor a waiting perid. If the paperwork is even close, the forger will get

the car registered. It is really very easy to do once ttre forger gets overthe fear of thinking that the forces of law and order are waiting in the

wings to arrest him the mornent he makes a mistake. The Departnrentof Motor Vehicles has no reason to suspect the forger of any

wrongdoing, so he should.iust act normal. If the forger ever feels the

need to regroup, he need merely walk out and go to another DMV, orreturn the next day. They won't care one way or the other, because theyare too busy to give a hoot. If the forger has to go to every DMV in the

city, then he does so. This is a job, and the forger is gefting paid very

well to do it, so he treats it as such. The vehicles the forger will be

working with will not be reported stolen until much later, and he is just"doing this for a friend' anylvay. The forger can use the sarne ID for allof the vehicles if he doesn't waste time. If tirne becomes a problenr, hejust calls up the agencies and extends his rental perio&. This is one ofthe beauties of this scam; there rue no stolen vehicles to report, so the

forger is never in jeopardy while doing it. If the forger uses differentIDs in each city, the rnagnitude of the crtne will most likely be

overlooked by each city's law enforcement authorities. This may notseem like a big deal, but the fewer police agencias working on the case,

the better off the forger will be in the long run. There is a vehicle stolen

every 17 seconds in this country, so the forga's plan is to not stand outin this corilnon occwrence, so that his crinrc will be iust another

sutistic that no one has tinre to worry about.

Now that the forger has license plates and regisfations to match his

vehicles and ID, it's tirrp to sell or borrow against the vehicle. If the

Page 79: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

80

tbrger wants to, he can do both at the sarne time in the sarne city. Theforger nmely makes up nnre than one set of ownership papers for thevehicles with which he wants to do more than one deal. The forger goesto as rrany banks as he can furd that will nnke him a collateralizecl loanon the vehicle, and he is in business. The banks will want to see therehicle before they make the loan, but that's not a problerq since theforger will not be giving the car to anyone until he has all of the dealslined up to happen within a few days from the begrrumg of his scarnThe banks rnail the lien notices to the appropriate state agency, so thetbrger will have three or four days from the tinre he actually surrendersthe title to the bank before the shit hits the fan. Three banks per vehiclers not pushhg it, and it's less than one day's work. When the forgermakes arrangernents to sell one ofthe vehicles through the paper or by:rr adveftised rneans, he always takes the vehicle to the potentialr;rer. That way, they never get to see the forger's base ofoperations,:-.,rr another vehicle. If the forger is pressed for time, he can always sell:e r ehcies at a car lot or auto auction. He acts the part of a nnn who-: ,:.'ng through a divorce and needs quick cash before the judge gives:--: :r-*jie everything he has worked hard for. The forger can also use

-l: r,:r_L;lptv-\' excuse, too; rnost salespeople are male, and if they think-i:i .,-r' .,:e helping a fellow male to get the best of a woman or the- - - . ' . . .,. r-- rend over backwards to help. The forger plays the role

: _.: .: ,,.-__. :.-l:lt. usually with successful results. Most-:' --. : rerllr is no big deal. The forger is

- .' : -, .rats li.ke a rezular Derson

a

Page 80: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

80

forger wants to, he can do both at the sarne tfune in the sarne city. Theforger rnerely makes up nrore than one set of ownership papers for thevehicles with which he wants to do rnore than one deal. The forger goesto as ntany banks as he can find that will nnke him a collateralized loanon the vehicle, and he is in business. The banks will want to see thevehicle before they make the loan, but that's not a problenr, since theforger will not be grving the car to anyone until he has all of the dealslined up to happen within a few days from the begifffng of his scarnThe banls rrnil the lien notices to the appropriate state agency, so theforger will have tlree or four days from the time he actually surrendersthe title to the bank before the shit hits the fan. Three banls per vetricleis not pushing it, and it's less than one day's work. When the forgernnkes arrangernents to sell one of the vehicles tlrough the paper or byany advertised nreans, he always takes the vehicle to the potentialbuyer. That way, they never get to see the forger's base of operations,nor another vehicle. If the forger is pressed for time, he can always sellthe vehicles at a car lot or auto auction. He acts the part of a man whois going through a divorce and needs quick cash before thejudge givasthe ex-wife everything he has worked hard for. The forger can also usethe banlcruptcy excuse, too; rnost salespeople are male, and if they thinkthat they are helping a fellow male to get the best of a woman or thecourts, they will bend over backwards to help. The forger plays the rolethat the audience will accept, usually with successful resulb. Mostpeople have sold cars before; it really is no big deal. The forger isselling a vehicle for which he has all of the legally issued paperwork,and it is registered wrth plates and title, so he acts like a regular personinstead of a crook.

If the forger really wants to do this scam big-time, then he can do itwith motor hornes. Their value is substantially more than othervehicles, and his return will be greater for the sarne arnount of effortand tirne. Since the forger has the opportunity for a really large score,he takes the time to set it up correctly. As an example, the forger cansetup a motor-home rental business in a different state, and with a littlepaperwork manipulation can then sell or borrow against the entirebusiness at one time. The forger does not have to have twelve motor

Page 81: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter ElevenVehicle Titles

8l

homes to appear to have them; the paperwork can show that they areout on rental whenever the lenders corne by to see hirn It is expectedthat some of them would be gone from the lot on any regular businessday, so it would seem norrnal to anyone stopping by. The nrereappearance of owmng ten or twelve motor homes is justification for a

two or three hundred thousand dollar loan from most banks. The truevalue would be around half a million dollars, so the loan-to-value ratiois very acceptable to most lenders. This is a very easily done scanL andeven if it takes the forger several months to set up correctly, he is wayahead of the game financially when the smoke clears. If this seems toointense. then the forger just treats the motor honps like less expensivevehicles and sells or borrows against them. Two motor homes areequivalent to half a dozen cars in terms of dollars, so the forger willoftentimes try his hand at the simpler scam until his confidence is whereit needs to be to do more. This is a ver), sweet crirne, and there is littlein the way of deterrents fiom the law to foil the forger.

There are manv variations of the vehicle-title pla& if the forger has

the paperwork angle covered so he concentrates on getting the basicsof creating documents down and is then in a great position to try sorne

of them. Many forgers concenfrate on vehicle-title fraud if check fraudis beyond their capabilities. Vehicle{itle fraud requires less publiccontact, and the penalties are not that severe. I have been forgingvehicle titles in one form or another for over twenty years, and the onlymajor difference tcxJay is that the current technology makes it a loteasier. If the forger is interested in other sorts of criffres, the vehicle-

rental parl of this scam is a good wa)' to acquire the vehicles needed fordoing them. If the forger has to abandon the vehicle for any reason, heis out little. The forger can also wash the title through several states inorder to keep the vehicle and use it for himself if he so desues.

Page 82: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter Twelve

The Bonded Credit Card

83

The Bonded Credit Card

TLus is one of the most important tools in the business, so the

forger must become familiar with obtaining them and always haveseveral, along with ID to match, in case of an emergency. Bondedcredit cards are offered by plenty of banks across the country, and

ads are always running on television for more and more banks thatoffer them. Most of the places that make them available nowadaysare interested only in the deposit that the cardholder must make, so

the requirements for getting them are easily met. If a paycheck stub

is requested, the forger can supply' al1 that are needed with a push

of a button. If the bank requests a photo of the forger's driverslicense, he can send them anything he wants to, or'he can just offerthe explanation that his license has been suspended. They will take

a notarized statement and a copy of the forger's birth certificate as

additional verification. If the bank requests a Social Securitynumber, then the forger sends them one that matches an ID setup he

has. The worst thing that the bank can do is refuse to do businesswith the forger, so he tries as many banks as he wants to until he

has the needed cards. As long as the bank has the forger's deposit,

ig feels protected. Giving the forger a card is no big deal to them.Anyone who has ever applied for such a card knows what I mean.

It is easv to get several cards from the same bank if the forger uses

Page 83: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

84

different addresses and names. The banks do not compare picturesor anything like that. If anyone comes snooping around gettinginformation on the forger after he has used a card, the most theywill get is a bad picture of him. When the forger sends them aphotocopy of something with his picture on it, he tries to make theimage of himself look as bad as possible. If the bank will not acceptit, then the forger tries another bad one until they do. or untilsomeone else does. Photocopies of photographs are usually terribleanyway, so the forger makes it bad, but not too bad.

Acquiring bonded credit cards is easy, and having them andusing them is a must for most types of fraud crimes. They are animportant tool that the forger will be hard-pressed to do without, sohe takes the time to learn how to get them.

There is a space on the appLication that allows the forger to get asecond card for someone else. If he gives the bank another name,they will send him another card with that name on it as well. Thiskills two birds with one stone. These cards are a very good way tolaunder money; they will accept a substantial amount of moneytowards the forger's card's credit limit. If the forger uses the cardfor most of his living expenses, he will be able to carry less cash onhis person when traveling or shopping.

With a credit card and drivers license, the forger can look normalwhile doing almost anyrhing. When renting vehicles, checking intohotels, or doing any other normal, middle-class actil'ities, a creditcard gives the impression of stability and credibility. both of whichare important to the person Living under an assumed identity. Theprudent forger will get several cards under his permanent (new)identity as well. The forger's fraudulent credit report under his new,assumed name, will appear better to those who mav be looking. Theforger can also bond a Goid Card, and several of these are reallygood at solving life's little problems. There is no one to question theforger's having fifteen or twenty thousand dollars tied up in bondedcards. It's probably something that would never come up anyway,but it's nice to have the cushion of the cash as a backup in case theforger ever needs to run away and hide. I cannot stress how

Page 84: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter TwelveThe Bonded Credit Card

85

important these cards are to people in this line of work. They helpcreate the illusion needed for doing crime and living before andafter the crimes are done. The forger can have as many cards as hewants, as long as he pays his bills on time. The banks don't careone way or the other.

Page 85: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter ThirteenAlt e rnat ive I d entifi cation

87

Alternative I d entification

This chapter is about an essential component of the forger's arsenal:take ID. The forger will have to use and lose several ID setups for eachscam that he doqs. He must acquire the skills and knowledge needed toobtain what is required in the ID departrnent before attempting anythingelse. The forger will need to pick up more advanced publicationsdesigned to further his education in the ID departnrent. There areseveral methods of obtaining legally issued, totally valid ID setups. Thernethods that are explained here are only some of the many that theforger uses to obtain drivers licenses and state ID cards, which willenable him to obtain Social Securi$' numbers and passports, f hewrshes. They are the methods which are preferred by many forgers, butthey may not suit the fledgling forger's abilities. Further study may berequired if the forger wishes to pursue this line of work.

The computer and scanner setup described earlier in this book willgive the forga the ability to make all of the documenrs needed toacqure new ID. If he obtains the notary stamps or seais. the forger caneasily provide the paperwork that is required by the state agencieswhich supply drivers licenses and identity cards. It is a sunple nntter touse the photo credit card for supporting ID docurnentation that is oftenrequested when one is obtaining a new drivers license or ID card. Thesemethods are what the forger uses for getting legally issued ID setups.

Page 86: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

88

They are the only way to go, so the forger doesn't waste his tirne witrranything else.

There is a very simple way that the forger can get a state-issued

drivers license or identity card. There is no way of guaranteeing whichone he will walk out of the DMV with, but either one is fine for hispurposes. Iftheforger obtains only the identity card, he can easily tradeit up for a drivers license at a later date of his choosing. Which one ofthe two forms of ID the forger gets is based on his ability to persuade

the clerk grving him the card that the forger needs the drivers license so

desperately that the clerk feels the need to give it to him The basicidentity card is actually sufficient for most of the forger's needs, but the

drivers license is always preferred and should be obtained if possible.

Taking the driver's test is a requirement that the forger should be

capable ofpassing. Ifnot, his career choice needs to be reevaluated.

This might sound a little on the crazy side, but it is surely a viable(and almost guaranteed) way to get new ID. I have done it many times,

and have never been refused. It is the only way that I or rnost otherforgers acquire the new ID setups anymore. One of the other benefits ofusing this method is that it requires no supporting documents at the

initial stage, and most of the tinre none during the second, either. If an

additional piece of docurnentation is requested by the DMV, a certified(notarized) copy of the forger's birth certificate will more than sufficein most cases. If the forger has trouble at one DMV branch, then he

goes to one of the rnany others that most cities have. The other real plus

to this rnethod is that it is virtually unstoppable by any type of lawenforcernent. There are so rnny police officers coming and going in the

cop business that the odds of the forger encountering one who has had

this scam pulled on him before are a million to one at best. And besides,

the forger is not really doing anything to make himself memorable

an)ry4y.

First, the forger dresses nicely and acts casual. He goes to a place

that has a lot of people, such as a mall or a fair or camival. AII workvery well, but, if given a choice, I choose the carnival, and do it at

night. The forger finds a real policeman (not a Rent-a-Cop), and acts

upset, telling the cop that he has just been robbed by sorneone who

Page 87: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter ThirteenA I I e rnat i ve Id en tificat i on

89

grabbed his wallet and then ran off toward parts unknown. The forgeracts a little upset, but not frantic. If the forger acts like a victirq mostcops will be sympathetic, even if they would rather be doing somethingelse. They will do what they have been trained to do: serve and protectthe public. The cop will then ask the forger for his narne, address, andother personal information that he needs to complete the all-importantpolice report. The police officer will accept all that the forger says as

fact, without questioning it. After all, the forger is the victirq and thepolice are tained to fte:lt victims with conpassion and respect insituations such as this. As long as the forger doesn't claim to have beenphysically attacked by the thiel the police officer will not call for anambulance or other support personnel. This is a garne, but it is a

serious ganre, so the forger never halts his act in the middle, or else hewill cause himself some maior heartaches.

The forger must convince a policeman that he has been robbed of hisidentification, in orcler to obtain a copy of the subsequent police repon.

Page 88: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

90

Now, with a copy of the magical police report in hand the forgergoes to the DMV and explains what has happened to the nice publicservant who handles his request. The forger says that he needs an ID ofsonre kind in order to begin the process of acquiring new credit cards to

replace those which have been stolen, and for checking into a hotel. The

forger acts helpless and victimizd and explains to the person helping

him that he cannot even check into a hotel without Foper idenffication,and that the forger is starting to fall apart because of this incident. The

forger mentions a good local hotel and has the number handy so that he

can ask the DMV person to call the hotel on his behalf. It is unlikelythat the DMV person will call for the forger, but even if he does, he willfind out that 99.9Va of this country's hotels will not accept aregisnation without some ID, and the forger's credibility and

wlnerability will only increase when they learn this. The whole idea

here is to get the DMV to give the forger what he wants, so the forger

says and does whatever he thinks is necessary to achieve this. There are

rnany aspects to the forger's becoming a successful con man and thief,

and convincing people to grant his requests is only one of thern The

aspiring forger must get comfortable with face-to-face lying and

spontaneous story-creating, as they are the cornerstones of a successful

white-collar criminal car@r. and will be needed in rnost of the crimes

discussed in this book.

Since the forger will tell the DMV that he is from another state, his

name will not be expected to be in the DMV computer (very

important), so the DMV will probably try to issue the forger a state IDcard. This is as good as a drivers license for most purposes, but if the

forger tells the DMV that he needs a drivers license so that he can rent

a car for his business appointnrents and to get around the city, there is a

good chance that the DIvtV will let the forger take the written drivingtest right then, and then let the forger have a license. These are

extenuating circumstances, and it is surprising what can be

accomplished if one tries. If the DMV will grve the forger only an IDcard, then he must be gracious and return the next day to take the

drivins test.

Page 89: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter ThirteenAl te rnut ive I dent if cut ion

91

When the forger returns, his new name will be in the computer, so heis already halfway there. It is important that the forger not fail the testnnre than two or three tinres. The important thing for the fbrger torernember is that the reason he does not have any other supportingdocuments is because he was robbe4 and he was told by the police thatthe police report would solve all of his problerns. The forger asks theDMV to call the police departrnent and ask tbr the officer who took hrsreport: "He said to hnve them call if there were any problems. " Whenthe forger throws this into the DMV's face, it is very unlikely that thecall will be made, and even nrore unlikely that the officer who took thereport in the evening will be on duty in the daytirne. Even if the DMVcalls the forger's bluff, he has little to fear and nothing to lose.

Most people cringe when faced with the possibility of confronting acop, and the fear of blatantly lying to them is what keeps rnost peoplefrom using this nrethod of obtaining new "legal" ID. All of this is verysimple, and once the forger has done this hirnself. he will realize justhow easy it can be. Many aspiring forgers will opt for another nrethod,and this is a sharne, because no other way of getting ID is as simple as

this one. I have never failed to get an ID in this way. I once had to go toanother DMV, which took almost ten whole minutes. because I had a

clerk that I couldn't work with. But he drdn't stop met he just delayedthe inevitable for a few minutes. I won because I was persistent, and Ididn't accept "No!' for an answer. The forger must learn that 'Wo.r' isusually used in place of " l am afraid to m.ake a decision on m1- owt. "People who take orders for a living seldom use their own free wili indecision-making. Patience and diligence are necessary in any successfulbusiness venture, legal or otherwise. The astute forger will practicethese attributes in his work, and try not to act too surprised when thingsgo his way.

When the need for short-temt disposable ID is felt by the fbrger, thefollowing nrethod works quite well. It means actually -eening a licensethat belongs to sorneone else who is in the DMV computer of the statethe forger is getting the ID in. This way has its pros and cons. The prois that the forger saves a step in the ID-card-todrivers-license process.and he gets a valid license right away. The con is that the forger get.s ir

Page 90: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

92

license that someone else is driving around with at the sarne tirne as he.

There is a slim possibility that the forger might encounter a problenlbut he knows the possibility exists, so he deals with it. The real ownerof the drivers license might also have a problem with his SocialSecurity number which might prevent the forger fiom opening a bankaccount for cashing check, but since the forger can get severaldifferent IDs from different DMV offices, he can always just change toan unencumbered ID that will work perfectly well. This concept is notnearly as confusing as it may seem. The successful forger is intelligentenough to grasp the basics of the scam under discussion, and isresourceful enough to know where to get his questions answered.

To get the actual papenvork that the forger will need to do this typeof ID setup, he wiLl have to visit one of the information-storagefacilities that all govemnrent offices make available to those seekingsuch information. These facilities are a treasure-trove of information onthe forger's fellow man, and they are free. They have copies of all ofthe docurnents that are used in conducting business on any normal day.These docurnents conlain full narnes, addresses, dates ofbirth, physicaldescriptions, Social Security numbers, and some even have the names

of relatives (and information about thenl too). These storage facilitiesgo by a host of different n€rrnes, but the average Joe calls themdumpsters. The dumpsters used by the DMV and the Office of VitalStatistics are gold mines of information for fraud cnmes. They containcarbon copies and discarded originals of applications for licenses, birthcertificates, and a slew of other bullshit that the system needs to keep

track of citizens. Since dumpsterdiving is a business endeavor for a lotof street people and aluminum-can collectors, the forger dresses

accordingly and takes a sack along on his foraging expeditions.

Dumpster-diving is almost fun, and the stuff that the forger salvageswill unfailingly blow his mind. Drivers licenses have physicaldescriptions and dates of birth on them. The forger nrerely finds one

that matches his general description and age, and he is on the fast trackto criminal success. Oftentimes, if the forger kills an hour prospectingin the proper dumpster, he will find ten such docurnents that will workfor him. He uses that information when he plays his nick on the cop,

Page 91: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter ThirteenAl te rn ative I de nt ifi cation

9-

because it will already be in the DMV's cornputer. The forger will alsobe able to tell the DMV clerk that he was recently in on the date that thecarbon or application states, and that he cannot believe that he needs toreplace the damn thing so soon. He suggests to the DMV that it wouldbe nice if he didn't have to pay again; after all, he was robbed. ln mostcases, the clerk will have sympathy for the forger as a victirn, and eventhough they do have to charge him agair; the clerk will nnke the ordealeasier. Hard or easy, the forger will still get the ID, and that ffanslatesinto a job well done.

When dealing with various goverffnent offices, the forger mustrernember that sonrc states are different, but in general the rules aremore or less the sanre. These are rules, not practices. The differences inthe way the offices are mn are astounding. There is absolutely nocorxistency in their procedures. What won't work at one place willmost likely work at another, or another, or another. It's rather likeasking people to dance; the first one might say yes, but then again theymight say no. If one wants to dance badly enough, one will ask morethan one p€rson. A negative response only rneans that one did not sayor do what that person needed to hear or see in order to satisfy therrequirements. Normal pmple have often been informed by bank orDMV personnel that their requests cannot be honored because of faultypaperwork or signatues. These people didn't blow a whistle, or try totackle the law-abiding citizen as he left. They simply went on to thenext person in line and f-orgot about the problematic one. Such clerksay "l/o.r' to a hundred people a day: it's part of their exciting careers.The forger need simply ask these clerk what it will take to satisfythenr, and then he will know how to play it the next tinie. If the scamgoes down without a hitch, the forger will be like the hundreds of otherpeople who they helped that day and sent on their way. These peopleare civil servants and low-paid employees. and processing suchrequests is what they do in their jobs. They are nor the F.B.I., so theforger can take hrs tinre and practice this deception at as many placesas it takes to accomplish his goals.

Page 92: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

94

One final point: the forger does not get fake ID in states which nnilthe ID, since his photo will be kept on file and he wiil need a real

address to receive the ID.

Page 93: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter FourteenInsurance Fraud

Insurance Fraud

Insurance fraud is not going to make the forger rich, but it is a goodshort-term cure for financial problems, and it is by far the easiest formoffraud. ffthe forger is not a homeowner, or a tenant who has been atthe sarne place for a long tirne with irxurance on his possessions, thenhe must pass on this particular crime. If the forger meets the aboverequirernents, this type of crinre is almost impossible to solve, and heshould be able to collect a tidy sum if he sets it up correctly.

The forger's policy is the key to the whole scarrL so he gives it agood going-over so that he fully understands exactly what is requiredand covered. Most normal policies have fi.red amounts for basicpossessions, such as electronics, clotlmg, guns, jewelry, and othernormally owned items. The forger will need to make sure that hespreads out his loss, or else he will run into a wall concerning theamount of coverage he has on particular items. If the for_eer sticks tothe basic burglary profile, the process will be quick and simple. Theforger reporls the crime, the police come out and make a report. Theforger contacts the insurance company. the1, verify the crime. Theforger collects on his loss. It's simple.

There is a residential burglary in this country every 15 seconds, andthe forger's scam will just be another statistic. A1l he has to do is fake a

break-in, lie about what has been stolen, and collect his check. It rvil be

95

Page 94: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

96

an additional opportunity for the forger to play the victirrl but it's reallyno big deal to anyone, especially the cops. If the forger does not haveadditional coverage for more expensive belongings, he has the choice ofcollecting the arnount of his current coverage, or adding coverage andwaiting another six months to file the clairn The difference can besubstantial, so if the forger can wait, then he should do so. If not, hecan purchase the additional coverage after the first break-tl and do itagain the following year. He might piss off the insurance company, butthe return is worth the hassle. This is by far the easiest crinre that theforger will ever do, and it pays quite well for being virtually idiot-proof.

The following things are not just irrportant for the forger to keep inmind; they are absolutely critical!L The forger must not tell anyone his intentions. His wife or

girlfriend will see that he is padding the clairn, but she doesn't need

to know that the forger faked the crirne. The forger needn't excludehis female companion, but he doesn't want her to have anyknowledge that can ever be used against him if she someday gets

angry or wants a divorce. It's the forger's call, but he does not need

any help at the crinre scene, and he never knows how she mighthold up to police questioning. If the forger is slich he can both dothe crime without her knowledge and be with her when the "break-in" is discovered. The forger can meet her someplace that she cango to directly from another place; she should not go there directlyfiom their honre. This gives him tirne to make the break-in lookconvincing, and then nreet her so that the two of them can retumhome later and discover the crirne. If the forger cannot keep his

mouth shut forever, at least her knowledge will be hearsay at best,

and a good lawyer might get him off if it ever conrcS to that.

2. Insurance companies always ask for receipts for one's possessions

when a burglary has taken place, and since the forger is going to lieabout what has been stolen, it's unlikely that he will have all of the

receipts the insurance company wants. So, to solve this problenlthe forger just tells the police and the insurance company that all ofhis personal papers (receipts included) were kept in a small,portable, fireproof lockbox. Since this box was also taken in the

Page 95: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter FourteenInsurance Fraud

9'7

crirne, the forger cannot provide any receipts for his purlornedpossessions. This will not sound as strange as one might think ttdoes, and besides, this is probably the forger's fust claim with thisinsurance company. Who's going to call him a liar? Most middle-class Americans have the sarne sorts of possessions in their honrcs,and the insurance company has a pretty goo<1 idea of what thosethings are, based on statistical analysis. The forger's loss will be nodifferent than most, with a few exceptions that will guarantee hiscollection of a decent arnount. Twenty or thirty grand is not a far-fetched figure for this primitive sort of fraucl. The average middle-class horne burglary results in a loss of almost fifteen thousanddollars, and with a little jewelry and a few electronic items addedin, the forger's claim will seem reasonable. The forger knows thathe does not get what he does not ask for.The forger will kick open his back or gara_se door. and move a t-ewthings around that might have been in the way w,hen it wassupposedly done. Or, rrnyb the forger will make it appear that theentry was gained through a window. There will be no hngerpnntsif gloves were used, and the authorities will assunre that gloveswere used an)ryay, so the absence of prints is reasonable andexplainable. The forger doesn't need to m;rke a big nress; that'sTV, not reality. Most thieves conp in, steal the sarne iterns. andleave without doing much real damage to the premises. The copsknow this, and so does the forger. He turns out a ./eu, dresserdrawers, and leaves some big, heavy iterns such as stereo speakersby a back door, as if they were left behind for sorne unknorvnreason. If the forger uses a window for the fictitious point of' entry,he messes up the ground outside the windorv a liule bit. Cops tendto notice these things. Also, if the forger krcks down a clocr. heweirs a pair of shoes which are a couple of sizes larger than hisown that he picked up in a second-hand store. He might leave a f"ewfootprins outside a window, to make it appear that the burglarpeered in before he broke into the house. It's the littje things thatmake the ffierence, so the forger thinks like a burglar when hecreates his false scenario. Of course, the forger can alwavs iusl sav

Page 96: bitify.com · Created Date: 10/18/2013 4:51:42 PM

4.

Document Fraud And Other Crimes Of Deception

98

that he left the door unlocked. It is not a crtne to do so, and it willnot affect the claimThe forger buys (and returns later) or borrows a couple ofshotguns or rifles that he can lean against a wall to have in the

background of a picture he takes of a friend or wife. This is the

kind of evidence that he can show the insurance adjuster to helpconvince him of the forger's honesty when he lists what was taken.

If the forger's policy has only a small arnount of coverage onweapons, the forger acquires and photographs what he thinks willbe needed to rnax out that particular coverage. The forger nnkessure that he tells the police about the guns, as most riflo and

shotguns are not registered, and his will be no different. The forgercan expect a lecture from the cops about firearms registration. Theforger explains that he had the serial numbers and paperwork on

the guns in the lock box, and since he has had the weapons foryears, atternpting to trace the record of his purchases is futile.The forger goes to several computer stores and buys a few bucks

worth of junk that is associated with cornputers. It has to lmk as ifhe had a cornputer sitting sonrewhere. Few crools take everything

a computer has sitting around it. The forger makes the place where

the stolen cornputer sat look realistic, as the police aren't all idiots.

He can pick up a few empty cornputer boxes at any comput€r

store, and they can be stored sornewhere in the house. The forger

can feign looking at the enpty boxes for additional information on

the expensive cornputer setup he recently purchased. The forger'scornputer might be included in his electronics coverage. If it is, then

his stereo gear will probably more than burn that coverage up. The

forger can always call his insurance company a few weeks before

the break-in and add coverage for his new computa. This is totallynormal, and ensures that the cornputer will be fully covered.

When the forger stashes the missing items that he actually does

own, he doesn't get radical about hiding them. No one is likely to

search his house or the trunk of his car. The forger cleans up and

rearranges things, since he is not expected to leave everything the

way he found it for the insurance adjuster to see. The forger

5.

6.

Page 97: bitify.com · Created Date: 10/18/2013 4:51:42 PM

7.

8.

Chapter FourteenInsurance Fraud

99

doesn't take things to a friend's place or to a neighbor's; it lookssuspicious, to say the least.

The forger doesn't forget his leather coats and other expensiveitems of clothing. He is trying to covsr all of the areas of his policy,especially if he does not have replacement coverage. The forger'sallowance for clothing is probably a thousand dollars; that is acornrrlon arnount. His policy will have all of the figures with whichhe needs to work.If the forger has replacernent coverage, he doesn't overlook themany porlable items that a good policy covers. A portablecoryputer, golf and scuba equipment, binoculars, canrcra gear, ancla violin or guitar tue all common. Stamp coilections and power orhand tools are both very normal and costly. There is nothing thatthe forger cannot claim to have had stolen ifhe prepares correctly.This crime can.net a sizable reward if the forger takes the tirne todo it right. Why would he do it any other way?The forger is mindful rhat he is a victim who has been paying hispolicy premiums for years to cover just such an event. He acts likehe is supposed to, and doesn't beg for anything that he has comingto him. The forger expects to be reimbursed, and he lets theinsurance company know that he does.

9.

Page 98: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter FifteenMaking One's Own Credit Cards

Making One'sOwn Credit Cards

r01

The credit card may seem like a difficult item to copy, but if theforger has the sanp equipnrent as the companies who make the cards, itcan be very simple. It's the acquisition and use of that equipment thatwill be covered in this chapter. For the forger, nnking his own creditcards is nrore or less the sarne as making his own docurnents. Heobtairs corr@t tools, and the job is virtually done. The tools for nnkingcredit cards are for sale to anyone who wishes to possess thern, as arethe tools for nnking docurnents, and there are no restrictions on gettingor owning thern

Credit cards are manufactured by several methods. The basicprocess is simple: take a piece of plastic, attach a magnetic strip on theback, cover both sides with printing, and then melt the name andnumber of the owner into the card. ln sorrc cases, the forger can andwill put the photo of the owner on the card as well. This may seemcomplicated, but the forger can buy the blank cards with the magneticstrips already on thern By attaching a machine smaller than a regulartoaster to his computer, the forger can print information and photosonto the blank cards with a few minutes of preparation and practice.Then, with a.nother small machine (which is not attached to thecomputer), the forger can emboss (melt) the name and numbers rightinto the card where they belong. Sounds a lot simpler already. doesn't

Page 99: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

102

it? It really is a good and simple way to accomplish a lot of things

besides just copying sonpone else's credit cards. A credit card with the

forger's photograph on it and a birth certificate will get him a new IDsetup in nothing flat.

None of the things discussed here are revelations or deeply guarded

secrets. They are just common sense applied to a particular problernLike most situations in this business, if the forger treats them in abusinesslike way, the mystery beconres nothing rnore than just leaminghow to get the tools and do the job conectly. If the forger wanted tobecorne a rocket scientist, he would go to rockerscientist school. If the

forger wanted to branch out and become a burglar, he would attend

locksmith and alarm schools. The process should be education first,and then the perpetration of the crime, but in most situations in the

crirne field, it's usually the other way around. Most people think thatcrirp is sonrething that anybody can do successfully with little or noftaining, and begirurers fail every day, disproving that thmry. It amazes

rne that most of the "criminals" I rneet in and out of prison always

blarne sorneone, or sornething, for their own lack of shll and raining.No one is born with knowledge, so why would anyone presunre to have

it when it's obvious that he does not? If the forger wants to do fraud as

a way to make rnoney, he must have the tools and knowledge.

Otherwise, he is just asking for failure and touble. If the forger wants

to do this type of thing for a living, then he must pay strict attention and

not take any shortcuts when assessing the requirernents for the tasks at

hand.

Making credit cards is actually a lot easier than making documents,

and no special skill is needed. The forger must, however, have the

capacity to follow instructions that a computer will provide him if he

asks for it. Most cornputers will walk the user through the prrcesses

necessary to achieve his goals, and the credircard setup is no different.

A little practice will suffice for this particular critrre. The stWS are

srmple and the computer is designed to help the beginner learn the

process. In a matter of hours, the determined forger will know all that

there is to know about the machine and its workings and capabilities.

Page 100: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter FifteenMaking One's Ow,n Credit Cards

103

There are several places to go to get the equipment to make one's

own credit cards -

just check the Yellow Pagas under "EmbossingEquiprnent & Supplies." The forger can get what he wants fiom these

companies - they deal with hundreds (or even thousands) of

custonrcrs daily, and the forger is just another customer to them.Anyone who wants to get involved in selling and manufacturing creditcard-like products (such as bank cards, ID cards, parking-_earage cards.phone cards, etc.) will turn to these companies for equipment andsupplies.

For the forger, setting up his own business to do this requires only anhour or so of his time and a couple hundred buck of his money. Oncethe forger has established a business entity, the embossing equipnrentcompanies will not only sell him the things he nee&, but they will helphim understand how to use it. They have support departnrnts. and a

phone call is all that is required to get a problem solved. All major citieshave embossing equiprnent companies with showrooms, and all theforger has to do is call up one and ask to see the latest plastic-cardsystem they have for sale. The forger tells them that he wants to makeand sell phone cards, parking-garage access cards, or anything alongthose lines. The salesman might ask the forger to corne in so that he canshow the forger all kinds of great stuff. The forger will not be expectedto know anyttring, since he is a beginner in the business. A gcrrd sales-

man will sense the forger's keen interqsq and, anticipating a com-mission as a result of selling sonte expensive equipment. will help the

forger understand what he can actually do with the embossingequipment company's materials to generate money for hrs new busi-ness. The forger supplies the interest, and the embossing equipnrentcompany supplies the knowledge and equipnrent. After all, theirbusiness success necessitates that new custorners. such as the deceotiveforger, buy and use their products.

It takes abut twenty thousand dollars to purchase the minimumequipment required to do this right. Although this rrnney will be wellspent, there are few who will part with even a portion of that arnount ifthere is another way to get the equipment. The forger who is less

concenred with what is right and wrong in the ph,vsical cirn:e

Page 101: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

t04

departnrent will employ the nrethods outlined in Chapter 18, whichexplores an alternative nrethod of getting started, along with the morewidely accryted methoc.

I will continue my description of the forger's activities, based on the

assumption that he has obtained the necessary equipnent and is ready

to get started.

Since all that the forger will really be doing is making himself a copy

of someone else's legally obtained and currently valid credit card, the

frst thing he will need to address is getting the necessary information toduplicate another person's card. The best and most dependable form ofthis information is a copy of the user's card. The good news is thatevery tirne a card is used, a copy is created. It is true that there is agrowing awareness of what is done with the copies produced fromcredit-card usage, but, as usual, the response generated by thisawareness is mostly half-assed. Many clerls don't bother to desffoycredit-card copy slips, but routinely toss them into the trash, with amindless disregard for the privacy and/or security of the credircarduser. The forger often concentrates on restaurants, because they are averitable gold mine for the type of credit-card information that the

forger is seekrng to acquire, e.g., Amcican Express @ecause they have

no set limit) and any Gold Card (for obvious reasons).

The forger can make and use any card currently in circulation, but he

must be aware of the card's limits in order to get a decent retum on his

investnrent of tinre. If the forger puts his photo on the card, as ranycard issuers now do, he can avoid the secondary ID problem that

sometimes accompanies large purchases. Since new cards are being

introduced into the nnrketplace every day, the forger can put his

picture on any card, and it wiX be accepted. When the card number is

run for verification, it will clear. The card with the photo is the

industry's latest attempt to foil credit-card fraud" but the technology

used to add the photo has been available for years. I have been puningpictures on various types of credit cards and arcess cards since 1992,

and it is a simple process with the equipment the embossing equipnrcnt

companies sell as an addition to their credit-card systems. They will sell

the forger anything he asks for, since there are no restrictions on

Page 102: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter FifteenMakine One's Own Credit Cards

105

owning and operating such equipment. A business license is notrequired to buy from the embossing equiprnent company, but it is agood cover for the forger, and avoids unwanted speculation.

The equipment needed for this work consists of a regular personalcomputer, a scanner, a printer, a canrera and an embosser. Ail of thenecessary'softlvare prograrns are already in the computer, which is setup to do what the forger wants. He just turns the computer on andmakes cardsl The scanner is used to copy the cards the forger wants toduplicate. He scans any real credit card into the cornputer, and thenchanges the information until he gets the name and numbers that hewants to print. Once the forger scans say, a VISA card into thecornputer, he will always have it in the database for future use. Themachine will produce a frrished card that looks like the originar one,with the exception of the embossed narne and numbers. The forger thenputs the card into the embosser and nrelts the narne and numbers into it.The holographic image is reproduced when the forger scans and printsthe card. The hologram may not be perfect, but it look realistic and thecard will clear, which eliminates suspicion. The forger can evenpurchase different holographic stickers ro put onto the cards. They lookexactly hke the real thing, but are not the same image. Try yourmernory right now: what image is on your VISA card? No one else islikely to know, either, and the clerks who glance at the forger's fakecredit card are certainly not going to interfere with a customer whornerely wants to spend money.

The only real glitch that the forger wili encounter is not really aproblerry just an inconvenience that the clerk will quickly solve. Themagnetic strip on the back of the phony card will not work when thecashier runs the card through the machine. This is due to the fact thatthere is no information encoded into that strip. Many va[d cards do notregister. so the clerk will just punch in the numbers manually. In sornecases, a clerk may even take the time to inspect the card to see if theycan clean it up and try again. This is because they are too lazy to typethe numbers in. not because they think there is anyhing wrong with thecard. The forger can make a few scratches on the magnetic strip withhis thumbnail ahead of time, and this will appe.rr to be the reason for

Page 103: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

106

the card's mal-frrnction, if the clerk bothers to looh which is unlikely. Itis a common occulrence for a credit card's magnetic strip tomalfunction; that is why there is a manual keypad.

Embossing equipnrent companies supply credit-card stock in a

variety of colors and formats. They even sell card stock in different

colors, just like most of the credit cards in use tday. The "designer"

card is the industry's latest innovation. These cards are the perfect

cover for the forger to practice and display his creativity. There is no

way for the n-rerchant to veri! the design. As long as the numbers conre

back OK, the merchant will just accept it and complete the trarsaction.

If a card has a photo on it, the merchant will be even filore at ease. Ifthe card's account has reached its limit, the phony card will be rejected

just like a real card. The forger will be infornred that his purchase

cannot be completed because the card is maxed out, nothing more.lfthe forger is using a phony American Express or any Gold Card, he has

no limit to worry about. He just limits himself to a couple of heavy

shopping days, and doesn't get geedy.

Another very good way to use the credit-card making equipnrent is

f'or obtaining ID. If the forger takes a credit card with his nanre and

photo on it into a Department of Motor Vehicles service office, he can

use it to get a state-issued ID card with surprising ease. If the forgawants to cover all of his bases and not have to rely so heavily on his

bullshitting ability, then he takes a birrh certificate (self-notarized)

along with hinr, too. The forger sometimes creates the paperwork for a

false police report, and brings that along with his fake credit-card

backup. There are several ways that the forger can provide the

docunrentation needed for obtaining additional identity cards. The key

to this nrethod of getting new ID is to ask for it, nothing more. This

method of obtaining ID is seldom employd because most people

consider it too difficult or outright impossible. I use no other rnetho4

because this is by far the best way of obtaining what I need. Once the

forger has the state ID card, hejust returns another day to take the test

to get his driver's license. This is an easy way to get all of the IDs he

wants, and sometimes the forger is tempted to do this for other people.

Page 104: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter FifteenMaking One's Own Credit Cards

107

Unless the forger is getting paid very well, he is foolish to fall victimto this seemingly easy nrethod of supplying ID to those who ask him fora favor. The odds are that som@ne will get busted, and the forger'sproblems will then corne from a direction he is not prepared for. This isa sophisticated enough crirne that the knowledge of it can be used as abargaining chip by sorn@ne else who has been busted and is willing tosave his or her ass by grving up the forger's. The forger mustn't benaive enough to believe that people can be trusted. partners are to helpspend the forger's nroney and then rat him off. Ifthe forger keeps thisscam to himself, he can rnake all of the money he wants withoutcreating liabilities he cannot control. This is also a business of surviva-.If the forger swims alone, his odds of getting pulled down are muchIower, and his profits are enhanced.

t.

Remember

If the forger dresses and acts like a businessman, he wiil be treatedlike one.

If one source won't sell the forger the equipnrent that he wants, hesrnply goes to another one. DMV service offices are everywhere,too.

The forger must never use stolen credit cards. One card's profitsare hardly worth the riskThe forger personally destroys every card he uses, and never keepsreceipts.

The embossing equipment is very easy to use with a little practice.

A

5.

Page 105: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter SixteenCounterfeit Money

109

Counterfeit Money

In the rubber-document business, sooner or later the thought ofrnaking cash will cross the forger's mind. If counterfeiting currencywere as easy as it appea.rs on television, we would be up to our asses inbad paper'. Reality is very different.

For starters, cash is printed, not copied. The equipnrent and paperused are beyond the reach of most of the dreanrers who hll our prisons.Although the technology is available, it's not worth the effort, if theforger considers the big picture when contemplating counterfeitingcurrency. The following example is my reason for avoiding thisventure.

l,et's say that the forger has everything he needs, which wouldinclude: a batch of useable paper, access to a decent offset press, theworking knowledge to set up the press, and the correct ink mixture todo a great job. Might as well throw in Cindy Crawford as an assistant,too, but the forger wouldn't want to overreact, so we'll skip her.Anyrvay, let's say that the forger worked his ass off and came up with ahundred grand worth of twentydollar bills. We could just as easily saya million dollars worth of hundreds, but the argument is the sanre; thearnount is not the issue. Now, the forger has a hundred grand worth ofpaper that is useless until he trades it for the real stuff. If the forgerwere to move a thousand of the bills a weeh it would take him hve

Page 106: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

110

weels. By then, every person in the city would know what he lookedlike. The forger's hundred grand is now down to about seventy-five oreighty grand, if he has been lucky and hasn't lost too much in hispurchase and exchange process... you know, the one he has been

engaged in for the last five weeks. We won't count deductions forexpenses such as food or gas; it's already tm depressing. ln the same

arnount of tirne, the forger could have passed a hundred grand worth ofchecls and spent a month in the Bahamas to boot. If not checks, then atrusrdeed scanL or stocks, or bonds, or any ofthe other docunrents thathave a face value higher than even a hun&ed-dollar bill. With the sarne

effort it takes to convince sonrcone to accept a bogus bill, the forgercould have passed a rubber check worth ten times that amount.

Ten grand is ten checks worth a thousand dollars each. How smartdoes the forger have to be to see the direction I am going with this? Ontop of everything else, check fiaud is nrostly a state offense andpossibly negotiable. Counterfeiting money is a federal offense withnnndatory sentences which are not negotiable. Ifthe forger has a desire

to waste his tirne and piss off the governrnent, why not just get a jobwith them and not oav his taxes?

Page 107: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter SeventeenThe Tenant Scam

111

The Tenant Scam

This particular scam is real-estate related, but it has so many otheraspects that it should be considered just another type of fraud crirne.The basic plan is to rnove into sorneone else's home as a live-in tenant,and then assunp his identity so that the forger can sell or borrowagainst his property's equity. The forger can also get additional creditcatds, or buy or lease an autonnbile or rnotor honp under this person'snanre. The extent of what the forger can do by assuming this person'sidentity is wide operl and I will not cover all of the possibilities becauseI don't know all of them myself. This is another situation where oncethe forger gets his foot in the door, the rest is up to his own creativity.

This scam is like most of the others I'm explaining, and it alsorequires the use of disposable ID. If the forger has the false-identityarea covered to the point he should have, creating docurnents and tellingthe lies that go along with them should be second nature to him by now.l,et's continue with the assumption that enough has been said on thatsubject.

Page 108: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

tr2

idr"#l#tlpilylzp,fl^jg

iELLEVUE 2sOk beutf I hse w/d. gIg' flpl' dw' tfgql!lfo:k=v-ro,'cul-ae-suc, NS, Nl' ND-$62 5' + '/z util'doors t

The forger usually has no trouble finding a shared-housing anutgement.

The forger should go to a newsstand and pick up several papers ffomcities that he wouldn't mind visiting to make a few buck. He can lookin the classified ad section under "Houses To Share," or some similartenninology. He finds the ads which imply that a professional person islooking for a roommate to share his financial burdens with. The forgercalls and speals to those who appear promising. The forger is lookingfor a residence that will have only the two of them living in it; no other

roorrurates, wives, or girlfriends who don't go to work every day and

leave the residence alone with only the forger honre. The for_ser -sets the

address as any reputable respondent would, and tells the person that he

wants to check out the neighborhood and drive by the place before he

makes a decision to meet him. The forger sives the imoression that he is

Page 109: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter SeventeenThe Tenant Scam

I 13

in town, or wiil be shortly, and that he is moving into a new place to get

a fresh start in life. (The forger also nnkes sure to use a blockingdevice on his telephone when he calls, so that he doesn't tip off the

person who has a caller identification device on his telephone.) Theforger needs to find several residences that seem promising, and then

either go to the city and check them out for himself or have an agency

do it over the phone. He needs to make sure that the residence which he

is considering renting has a decent amount of equity in it before the

forger wastes any nrore of his time on it. The address is all the forgerneeds in order to look at the mortgage paperwork at the courthouse.

The paperwork will provide the forger with the name of the mortgagecompany, as well as any other debts the property has against it. Thedifference between the amount of the mortgage and the selling price willgive the forger sonre idea of the equity value he will have to work with.How much equity value exists will determine whether or not this placeis worth the forger's tirne. The forgo should know that he can oftenborrow about 75 to 80Va of the equity arnount without a new appraisalor much hassle.

The forger can also have a real estate agency check out theproperties he is interested in over the phone without leaving his

hornetown. If he calls a couple of real estate agents in the town in whichhe is doing crinre, the forger can obtain the names of some businesses

that will do such checking for a fee. The forger tells them that he iscurrently involved in a business deal that concerns these properties, and

that he wants basic information on them that any businessnnn wouldbe apt to be seeking: the mortgage arnount, the balance of the mortgage,

the owners' narnes, and any liabilities associated with the property. Theforger makes arrangernents to pay the real estate agents with an

untraceable rnethod such as rnoney orders or cashier's checks whichcan be sent via overnight mail. It's a long shot that the forger'sconnection to these properties and a crime concerning them will ever bemade, but he should reduce the risks whenever possible. The questions

that the forger is asking are normal questions which are posed all of the

tirne. He needn't nnke his inquiries seem mysterious. The forger shouldbe able to get his answers in a couple of hours, as this process is very

c,

Page 110: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

rl4

srmple and inexpensive. There is no reason for the forger to go to thecities which don't have properties that are in his profile search so usingan agent does have a purpose. Doing so saves the forger tirne andenergy, but it does not replace his presence rn the long run. Whateverthe forger's goals or expected involvernent are, he must rernember thatthe crime game is more than just a hobby, and he shouldn't expect toreap nrore than he is willing to sow.

Once the forger has decided on a prop€rty, he makes arrangements tomove in, and tells all of the lies that are necessary to make his landlordhappy. The forger is playing a role, and if he has a cell phone at hisdisposal he can veri$ any lie he tells. (See Chapter 19 for moreinformation on how the forger does this.) If the forger pays the victimthe money he is asking for, he is doing what is asked of him The forgeris solving a financial problem for the landlord. If the forger dwells onhis recent divorce and his own personal reasons for wanting to move toa new place and s[art over, his new friend will beconre a person he cantalk to. The forger's apparent rulnerability plays a key role in gettingthe victim to trust him Doesn't everyone irstinctively trust and want tohelp out the little puppy that seems lost or alone?

The next day, when the forger's landlord goes out to worlg the forgerwill also go to work. The forger frnds out what tinre the nnil cornes andmakes a rnental note to be around then and let the mailnnn beconretamiliar with his retrieving the rnail from his hand or the mailbox. Theforger can find out a lot about his victim from the return addresses onhis mail. Anyttung from a mortgage company or a credit card companymay contain valuable information, and the forger will open and read it.The landlord need never know that this mail ever arrived. If the landlordis attempting to refinance or get new credit cards, the forger can assunrchis identity and use this information to his advantage. If the forger isthere to receive the mail, the check that he called and directed therefinancing institution to send will arrive in his hand hrst. The forgerwill have brought the necessary materials and paperwork to fabricateID with the landlord's name on it. How the forger does this is hisbusiness, but he will need to do it as soon as possible so that he canopen up bank accounts and cash the check when it arrives. The mail

.a

Page 111: bitify.com · Created Date: 10/18/2013 4:51:42 PM

4; a,l

Chapter SeventeenThe Tenant Scem

115

will tell the forger where the landlord banks, so he nrerely goes toanother bank to do his business. If the forger asks his victim to suggesta banh he will most likely respond with the narn{s) of the bank orbanks he uses, which can then be avoided. The forger can also applyfor credit cards at his new bank. Since he has credit and most banks

offer their own cards, he will probably get them rather quickly.

'(\=YThe forger sometimes steams open his absent housemate's mail

in search of peninent financinl informationl.

The resourceful forger finds a small car lot, and has the salesman

run a credit check on himself (using the landlord's name), even if he has

to pay for it. The forger tells the salesman that he was recentiydivorcd and wants to find out if his ex-wife has rnessed up his credit.

The salesman will understand the forger's stated reasons, and will most

@

r,

Page 112: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

116

Iikely do it for him If the forger has to, he will act interested in buyinga car. The report is full of information that the forger wants and needsto carry out his crime. With the credit report and the infornntion fromthe mortgage paperwork in hand" the forger has all that he needs to getadditional credit cards and refinance the property. Sorne banks offerwhat is known as an Equity Credit Line. Tltts is basically a credit linethat uses the equity in the properry as collateral for any spending orcash withdrawals the property owner makes. This is actually the bestway for the forger to get his hands on the equity from the property. Ifthe forger wants to, the property can be refinanced by phone from oneof the nnny places that advertise this service. The process of applyingby phone rennves all of the personal contact between the forger and alender. All of the questions the forger has can be answered over thephone. He can call as many frnance companies as he wants to. Thecanny forger realizes just how simple it is to refurancE any property.

The forger can contact his landlord's rnortgage company (tre haslearned the'mortgage company's narne from the victim's paperwork)and inform them that he wants to refinance, or take out a secondrnortgage on his property. Since the nrortgage company will assurnethat the forger is the owner, they will do all of the necessary businessover the phone. The nrortgage company will already have all of theoriginal loan infornntion on the victim and his property in their files, sothe process is very quick and hassle-free. The forger tells the rnortgagecompany that he wishes to avoid another appraisal, and so is seeking a

loan that will fit within the guidelines already established. This isnormal and saves tirne and nnney, both of which are usually importantto sonrcone looking for cash from a mortgage company. If the mortgagecompany insists on an appraisal, the forger arranges for it to take placewhen the victim is working, and tells the appraiser that he wishes tokeep the fact that he is bonowing money to himself, so that if the"roommate" (victim) does corne horne unexpectedly, he can ask theappraiser to leave and corne back another tirne. The forger is supposedto be the owner and the boss of what is going on, so he gives directionsand acts like sonreone who is in charge of the situation. The forger isnot asking the mortgage company to loan him money; he is giving them

r*

Page 113: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter SeventeenThe Tenant Scam

rl7

the chance to make him a loan so they can make money. It's amazinghow many people get the basic facts of dealing with a lender or bankbackwards. The forger knows that he is the boss; he acts like it and istreated accordingly. Do you think Donald Trurnp asks for anything?

I didn't rnention the check-cashing part of this scanl because it is

really no different than cashing any of the checks that the forger gets

from any ofthe scams he perpetrates. The forger should have at least acouple of weeks before anyone gets wise, and if he is at the residence toreceive the paynrcnt book for the new loan when it anives in the nrail"

he can stretch out the tirne p€riod even longer. The forger can alsopurchase a car or rnotor horne while he is waiting around. The forgerwill have credit, so he can take a vehicle he bought in another city andborrow against it in the victim's narne at several banls in the victim'stown. The forger can take the rnotor horne or new car to another cityand sell it with fake titles, or borrow against it. He can also /ease somevehicles and sell them or borrow agairst thern The options are nuny,and the forger has the tinre and opportunity to do them properly. Ahundred grand is not that hard to net if the forger is willing to spend amonth or two on the setup.

r,

Page 114: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter EighteenThe Office

r19

lne uurce

[rt's consider for a moment that the forger is sincere in his desire toget started n the fraudulent documenl business, but is short of the

nec€ssary funds to do so, or would rather do it without spending the

serious money required. There is always a way if the desire is strong

and the morals are weak. The biggest expense in setting up a

professional scam (such as several mentioned in this book) is the

equipment to do it. lrt's look at several nrethods of acquiring this

equipnrent. A11 of these nrethods require that the forger spend sonemoney, but it will be substantially less than the twenty to twenty-fivegrand needed to do this legally.

The rnethods that make the most sense and require the least amount

of violence both start out the sarne way. Each requires that the person

who wants the equipnrent open up an office and set up an account withthe equipment dealers. This way the dealer not only provides the needed

equiprnent, but actually delivers it and gives a certain amount ofinstruction on its use. It dqends on the direction that the forger istaking as to just how much further instruction he obtains, but a little isbetter than nothing. If the forger chooses the grab-and-go rnethod, his

instruction will be brief, but if he paid attention, he can filI in the rest

with a little hands-on experience and a few phone calls to other

distributors of the sarne equiprnent. If the forger chooses the second

r,

Page 115: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

r20

method, his instruction will be more comprehensive, but the costs willbe greater because he will continue the charade a little longer. As ap€rson who has used this equipnrent and taught its use to others, I canstate that in most situations, a couple of days of practice are all that theforger will need to learn the use of this equipnrent. If a problem arisesthat the forger cannot solve by himserf, then he can call a cornputerstore or the embossing equipment distributors for an answer. The needto stay in contact with the supplier of this equipnrent is actually quitesmall. The forger can get supplies and parts from many other sources.This equipment is sold worldwide, and its possession is no big deal inthe business world. The forger will be treated just like any other personinterested in buyiirg equiprnent and suppries when he deals with themany places that sell this nnterial. All businesses need customers, andthe forger is a potential custorner, so he relaxes and asls questions.

The first thing that the forger needs to do is find and rent an office rna respectable part of town. An executive suite canbe found and leasedfor ttree or four hundred dollars. The forger can go above or below thatamount, but he must keep in mind that he is trying to make anirnpression on equipnrent dealers, so he shouldn,t pinch pennies. Theforger can feel free to sign a long-term lease, which is, of course, worthnothing if he chooses to break it. He can get a good setup this way. Theforger's references can be handled by using a cell phone that has ananswering recording of whatever lie he selects, or by making use ofseveral answering services around town for a few dollars. Answeringservices will answer the phone any way the forger requests, and say justabout anlthing he wants. Most high-end office complexes will make acall or two, but they really want tenants and money. If the forger triesseveral, greed will eventually prevail.

When the forger has his office set up and looking normal, he callsseveral office-supply outlets and arranges for salesrnen to visit andshow him a good copier and possibly a computer setup. This stuff is forrent or sale at dozens of places in the phone book. The forger lets hishngers do sorne walking until he has three or four who are willing toconre out and try to sell or rent him something. I will provide a list ofthe forger's desired equipnrent at the end of this chapter, so, with that in

ra

Page 116: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter EighteenThe Office

rzl

mind, let's rnove on. After the salesrnen have spent a reasonable

arnount of tfune trying to sell the forger something, he informs them thathe will be in touch in a day or so and runs them off. The object is tomake them wait, so that when the forger calls back with a decision theywill jump at the chance to help him. The forger has them deliver theequiprnent with the understanding that a company check wili be waitingfor them.

The forger will schedule as many deliveries as he can, but doqsn'thave them arrive at the sarne tirne. The more equipment the forger canobtain, the more he will have to sell for working capital if he needs itlater. The equipnrent will most likely be delivered by sonre deliverypeople who will just take the check and vanish. They would not havebrought the stuff if there were any anticipated problems, so if theyshow up, the forger is in the ganre. The forger might not bat a thousandwith all of the places he contacts, so he calls several, just to be sure

he'll get what he needs. If the forger has any problems with getting the

stuff, he can make arrangernents to lease or buy the equiprnent over apenod of time. The down payment may hurt a little, but it is easilyrecoverable later. If the forger chooses the grab-and-go nrethod, he

arranges the delivery tinres for Friday and Saturday, and is gone by the

time the checks bounce on Monday.I consider the embossing equipnrnt to be a necessity for the

perpetration of any successt'ul fraud crirne. The acquisition of thisequipment is important and is given careful consideration by the

knowing forger. Their equipment is the most expensive, and is key tothe whole ffice scam They will take a check for their product. just likethe other places. The cost of their equipment is considerable, so theforger will spend rnore time with the salesman, in person and on thephone. There might be only one or two places per city where embossing

equipment is available, so the forger plays it smart and doesn't rush. Ifcost is not an object, and the forger wants tinre to beconre familiar withusing the equiprnent, then he makes arrangernents to buy it over a

penod of time or lease it. Selling this stuff is the salesman's business,

so he probably has several sources which will work with a reasonable

down payment. This will cost the forger some cash, but it is still better

r2

Page 117: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

r22

than buying it all in one shot. Ifthe forger arranges to beat several otheroffice-supply businesses out of extra offrce equipnrent, he will be ableto recover his cash outlay sooner. With the ffice as a front, the forgercan have all kinds of things delivered to it, and pay for these deliverieswith checks. As a going-out-of-town extra, the forger can get sorne

items delivered on the weekend and take them with him before thebanks open on Monday.

When dealing with embossing equipment companies, the forger willfind it difficult to examine all of the equipment they have for sale forthis type of business. The salesman will bring a condensed version tothe forger's office for a dernonsffation. If the forger wants to see thereally good stuff, he must go into their showroom for a peek. Theforger will do this for a couple of reasons, the lust being that he will geta thrill out of seeing the high-tech toys which are available if hispockets are deep. The second reason is the opportunity to case tJre

place. It is very likely that the showroom has an alarm systenq but theforger might spot a weakness which he can exploit. The forger desires

all of this highly expensive equipnrent, and he has several options forobtaining it. If all that stood between me and several hundred grandworth of money-making toys were one or two pencil-necked geeks, itwould be an easy decision. I don't advocate or recomrnend violence,because robbery needn't be violent if done correctly, but it is a nreans toan end and the serious forger always considers it as an option. If therobbery talies place in another state and no one is hurt, it will be filedand forgotten, like the nnny other robberies which took place thatweek.

There is one other option to acquiring most of the items which theforger requires for his operation. The forger will have to buy theembossing equiprnent system legally, but he will have the cash fromselling the extra equipnrent he obtained by using the above-mentionedrnethod to work with and offset that expense. The embossing equipnrentis a vital cornponent of the forger's setup because it is an importantnrsurs of creating the photo credit cards which are needed to obtainadditional ID setups for the forger's crinps. It can be forgone if theforger has another nrcans of obtaining false IDs, but few nrethods are

:*

Page 118: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter EighteenThe Office

r23

cleaner or quicker. The computer and related equipnrent are stillexpensive acquisitions, so the forger will sonretirnes consider taking a

trip to another city and engaglng in a little breaking and entering as afireans of solving this problem. If the forger goes to another city andrents an office in a good complex with executive suites, he will be

surrounded by offices with computer setups in each of them. Theseoffices will contain more than enough equipnrent to satisff all of theforger's needs, with plenty left over to sell, and the only thing betweenthe forger and this equipment will be a couple of doors. How the forgerdeals with those doors is his business, but it sure beats armd robbery.If the forger chooses this type of equipment-gathering rnethod, hemustn't forget to clean up after himself. A stray fingerprint would be asloppy way to sign his work.

The following is a list of the recommended equipment the forgershould try to obtain and learn to use:

l. A personal cornputer with at least a 386 processor. IBM forrnat.2. A Hewlett-Packard HPIII or equivalent, MlCR-capable printer.3. A high-resolution, optical recognition, color scanner - 600 DPI

minimum.

4. Photo copier - The best one the forger can talk the salesman intoselling and delivering.

5. Credit card equipment with photo capacity.6. Laminator, embosser, cafirera, and plenty of blank card stock.7. A good typewriter with changeable fonts.

r+

Page 119: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter NineteenFor The Forger's Information

r25

For ttre Forger's Infonnafion

When applying for loans from banks or other lenders, the forger isoften asked for proof of employnrent, inconp and residency. I willaddress these issues at this point.

The frst is incorne, and this can be solved in two easy ways, if theforger has the equipment and comnnn sense required. The forger tellsthe inquiring party (the bank) that he is self-employed and has been so

for most of his life. The forger will need to create incorne tax staternents

and return forms, along with some earnings and loss statenrents ifrequested. The forger can get blank forms from alnrost any offrce-supply store, and nrerely doctors the dates on them to correspond withthe lies he's told. The formulas and amounts are actually just figuresthat the forger makes up, and which add and subffact correctly on thedrcurnents to look like any other real tax statement. The W-2 form thata legitimate worker normally gets in the mail from an employer is easilypurchased and filled out by the forger. The forger sornetirnes actuallytakes the W-2 form into a real tax preparer such as H&R Block andhas it fill out the paperwork for him. Once the forger knows how to doit, he can do it for himself from then on. There is also cornputersoftware available that allows the forger to create his own tax retumstrom scratch. Both of the above methods supply the forger withpaperwork that is almost impossible to verify. There are a couple of

t,

Page 120: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

r26

documents that the forger can create and notaize himself, and thesewill be accepted by 95vo of the lenders out there. After all, where woulda bank or anyone else call to verify the forger's fraudulent tax records?After 20 years in this business, I still don't know, and I have tried hardto find out. The lenders are obligated to accept certain pieces of paper.which they require in their determination as to whether or not to make aloan. Docurnents which look offrcial, along with a possible notarystamp when needed, are arnong these universally accepted pieces ofpaper. A business license can be obtained in about ten minutes at acourthouse by anyone with twenty-five bucks and a name for thebusiness. There are few, if any, requirenrcnts for this docurnent, yet it isone of the most important items one needs when deaiing with a bank.

The other nrethod is for the forger simply to tell the inquirer the narneof his "employer," and then provide the firke docurnents required. Theforger can use a cell phone or answering service to cover any of the lieshe has told. when the lender calls the cell phone or answering service toverifu the forger's ffiormation, it will get a recording or a ,,secreLa4/,,'

and will usually request a return call. The forger can then return thelender's call to complete the paperwork. The forger can also tell the"secretary" at the answering service the information he wants relayed tothe lender, and she can do the job for him. Most of these places will dothe forger's bidding for a fee, and he need nrerely look until he frndsone.

Either way the forger does this, his place of employnrent is verifiedand accepted. The forger can use the second rnethod with a landlord ormortgage company to verify his residence and provide payrnent recordsthat are not in the TRW (ot equivalent) credit bureau. The forger cansetup several cell phones if he wants to, along with all of the answeringservices it takes to achieve his goals. Since IRS and most other taxpaperwork is easy to create and tough to veriS, the forger should havelittle trouble in his dealings with the businesses he chooses to use in thepursuit of his scams.

The forger may also want to create his own business or corporationto use for himself as his actual place of employnrent for his realidentity. Few pmple have the money to retire, so the forger doesn't

t*

Page 121: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter NineteenFor The Forger's Information

12"

rnake himself the subject of speculation by pretending to be one of thosepeople. If others think that the forger Eavels in his worh he will bemore readily accepted in the community and fewa questions will be

asked. The forger can set the business up in another state and payhtrnelf a reasonable arnount with a company check that he deposits ina local banlq just as if he were gefting paid a regular salary. The forgercan appsr to be a consultant, a cornputer programnrer, or even anauthor ofbooks that nobody reads. Ifthe forger doesn't appear to makea great deal of rnney and doesn't play the mystery marL he will blendinto middle Arnerica fine. The forger makes all of his major "toy"purchases in other regions, and the locals don't see his spending habits.It takes as much concern and determination for the forger to live withthe nnney he steals as it does to steal it. The single most common thingthat all criminals share in their work is too much tirne on their hands.That, along with too much money, are the two things that the averageJoe and his family lack. If the forger stands out, the "hnve nots" vt1ll.

bring him down. Their jealousies are the forger's biggest enemies, so hemust always be aware of their attention when he does flamboyantthings that they cannot or will not do. Those who share the forger'ssecrets with him will want to get involved" and if he denies them theirinvolvernent, they will resent hirn Every person will give the forger upif properly motivated, and he is a fml if he thinks otherwise.

.o

Page 122: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter TwentyAn Unethical Real Estate Scam

An UnethicalReal Estate Scam

129

There are countless books on making money in the real estate

business. I wrote one myself. But the following nrethod is not discussedin any publication I have ever seen or heard about. If it is everdiscussed in casual conversation, it is usually in the negative aspect.

What I will describe is simple in actuality, as close to illegal as one canget, and as unethical as it is profitable. A Realtor with scruples willmost likely not even know what is being discussed here, but since mostRealtors are crooks, they will know about it, but will just act as if theydon't. It does violate enough civil and ethical rules to guarantee theperpetrator's losing any court action that might come his way as aresult of his use of this method, so that makes it close enough to bein_e a

crime to qualify it for inclusion in this book. The person that the forgerdoes this to will swear that it is a crime, and you can hardly blame himfor thinking so. It is by no rneans a get-rich-quick scanr, but it is aviable way to make a healthy score, and the forger gets to do it whilewearing a suit.

The process is actually quite simple. The object is to buy propertythat the seller is *illitg to carry a second mortgage on, then forecloseoneself out and buy the property out of foreclosure from the mortga-secompany. This process eliminates any second or third mortgages whichare against the property. If the forger is ready with the necessary

co

Page 123: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

130

financing at the moment of the dissolution of the first mofigage, he cancollect the equity that is created by the elimination of any other debtsagainst the property.

Now, once again, but this tirne in plain English. The idea here is forthe forger to assunrc a frst morlgage and not nrake payments on it,while he does make paynrcnts on the second mortgage he has with theseller. The first mortgage holder wil foreclose on the forger for notmaking payments to hirq while the second mortgage holder is not evenaware of what is going on. Since the forger will be making payments tothe second mortgage holder, he will not be violating his contract withhim. The second mortgage holder has no right to do anything about theforger's other deal. but his awareness of the facts is an irritant theforger should avoid if possible.

The fnst mortgage holder will begin the process of foreclosure bysending the forger notices and calling him after a couple of months ofthe forger's ignoring them. The first mortgage holder's job is to try andget the payments from the forger, but he is also trying to protect hiscompany's money. He will make attempts to work sornething out withthe forger, and is not considered an enemy. The forger's job is to do andsay whatever is required to force the fust mortgage holder to forecloseas soon as possible. This is where this ffansaction becomes unethical,because the forger has to lie about his intentions to anyone whobecomes aware of what's going on. The forger informs those whobecome concerned that he knows what he is doing, and that his businessis not a subject he wishes to discuss. The forger can give the impressionthat he is planning to refinance in time to solve all his problerns, and inthe time frame they have indicated. After all. if the forger does not comethrough in time, the first moftgage holder will have the property, andthe forger will lose it. It's a business deal, nothing more. Foreclosureshappen all of the tinre in this business, and it's no big deal to thoseinvolved, so the forger acts appropriately.

If the second moftgage holder gets into the picture, the forger willhave to convince him that he knows what he is doing and that there isnothing to worry about. If the forger is making his payments to thesecond mortgage holder, he will assume that the forger must have a

a$

Page 124: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter TwentyAn Unethical Real Estate Scam

131

plan or something going on that is not readily apparent, or the forgerwould not be wasting his money on the payrnents. The argument isIogical and easily beteved. The process consists of the forger lying hisass off until it's too late for anybody to do anything about it, and thenshowing up at the foreclosure sale and informing the participatingpafties that he has made arrangernents to buy the entire first mortgageas soon as the clock runs out on the frst mortgage contract. Thernortgage company's job is to protect their investors' money and tocollect all of the outstanding debts in any nxmner that is legallypossible. They are under no obligation to inform any of the othermortgage holders of what is going on. As a natter of fact, the forgershould inform the first mortgage holder that the dealings with the othermortgage holders are his business, and any interference in his businesspractices would not be appreciated and might result in legal action ifthey were to take unauthorized action in any form other than what isexpressed in the contract. This is a sffong-arm tactic, but it is legal andhappens all of the time.

The frst nprtgage holder may rea\ue what the forger is doing, butwill likely opt for the legally protected methods of covering his ass. Hewili collect his money, pay his investors, and move on to other thingsthat are not related to the forger's business. It's a dog-eat-dog worldand the mortgage holder broke no laws in his dealings, so all that canhappen is that the forger can be sued rn civil court, and the mortgageholder he was deahng with will probably recomrnend that the others sue

the forger, but it will be after the fact, and only done to look as if he

were really concerned. Since the forger will be in a position to have the

property frozen by a court action, the mortgage holder will sell it as

soon as possible. The forger takes his profit and walks away, letting the

buyer and the others fight over the property. This might sound like a lotof trouble, but the potential for a large score is there if the forger cares

to do his homework.

FO

Page 125: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter Twenty OneTo Recap

To Recap

The prospect of getting a cornputer, setting it up with the variousother pieces of equipnrent, and rnaking it work properly may soundoverwhelming. The prudent forger will take the tirne to go over thesteps enough tinres to familiarize himself with the process and reducethe anxiety. To most people who are not familiar with computers, theyseem cold and foreigr-appearing. Many people overconp those veryfeelings when they receive a@uate instuction. The most irrportantfactor is the forger's desire and willingress to try. without that effort,there is little that can be done to motivate him Tuning up one's carrequires greater skill and is more diffrcult than using cornputers to rnakeor alter docurnents. The term "user-friendly" refers to how easily thecornputer does the things the user wants done on it. Today's computersare very user-friendly. Ifthe forger can hunt and peck on a typewriterand follow srmple directions such as: "Move the cursor to the part ofthe documcnt you want to change" and press "Enter," then he is easilyable to use and succeed on rnost corry)uters. When the forger purchasessoftware for his cornputer, he tells the salesman that he needs a modelthat conres with good instructions and a builrin "Help" function. Thesalesman will direct the forger to the products that he wants. There aredifferent versions of most programs, so the forger must make sure thathe gets the features he wants in them. Most advanced programs assunrc

133

Page 126: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

t34

that the user has the knowledge to use them and doesn't need additional

instructions. Since cost is always an issue, they include or:d.y wlnt they

think the user will need not what the u.rer thinls he will need. If the

forger uses a salesman when he shops for software, things will go much

smoother.

The actual hands-on usage is so easy that once the forger does it, he

imrnediately realizes how foolish his fears of irrconpetence were. I have

been using cornputers and teaching tlpir use since they were firstinroduced to the general public in the mid-seventies, and all I can say is

that computers are a piece of cake conpared to prograrnrning a damned

VCR. Every day conputers becone rnore user-friendly. I am nowusing one that follows voice commands. Both of my sons are rocketscientists compared to rne. ff the fledgling forger were to devote the

same time and enerry to studying cornputers as he would to learninghow to run the cash register at a 7-Eleven job, he would be a pro in notinp. Renrember, even a Ferrari starts at zqo. If the forger plays his

cards right, he can buy one and see for himself.

When the forger sets out to do sonp of the crines discussed in this

boo( the preparations he rnakes before and during the crirne will be the

difference between doing it and doing it right.If the forger has set up

the proper IDs and has made correct arrangenpnts to cash the checlsand erase all traces ofhis presence, he is starting to get the big picture.

There are two ways to do anything in life: the right way... and all of the

other ways.

It doesn't rnatter which versions of crirne the forger is doing; the

check-cashing is the one factor that always makes the difference in the

actual amount of net profit he realizes, versus what he could bave takerr

in. If the forger takes the time to fravel to the places he intends to do a

crhrte in, and opens up the bank accounts at least 30 days prior to his

crime, he will increase his percentage of surcess by a factor that willmake a big ffierence in the long run. I have done it both ways, and itseems that it doesn't matter most of the time, but the times it mattered,

it really rnattered. The frrther in advance the accounts are opened the

better. The forger will learn how to deal with bank cashiers and loan

officers quickly. Soon the forger will see that they are no different than

:s

Page 127: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter Twenty OneTo Recap

135

any other fuh in the sea. If the forger has the gft of gab (and in thisbusiness it is a major plus) this profession is his calling. Fraud crime isactually quite fun, if the forger lets it beconre so. DMVs are for gettingIDs and licenses, and banks are for banking and cashing checls: it'swhat they are there for. Nothing the forger will be doing is out of theordinary, and if he acts norrnally, he will not alert anyone who mightotherwise renrember hirn Dressing for the part and acting like a normalperson are part of the gane the forger is playing. His appearance andrnnners are props in a play. If the forger never forgets that the criticscarry badges, he might not win an Oscar, but at least he can afford tobuy one if he wants to.

L

Other Points That the ForgerAlways Remembers Are:

When the forger is opening accounts or cashing checls, savingsand loan institutions are just as good as regular banks; they justhave fewer branches.

If one DMV outlet says no, it doesn't tell the others about theforger's attempt.If one DMV outlet issues the forger an ID, it doesn't tell the othersit did so.

The forger could get a different ID from each DMV outlet in thecity.

The forgo should avoid getting IDs from states that mail thenr, as

his photo is kept on file and he needs a real address to receive theID.If applying for a passport, the forger always uses som@ne else'sfingerprints on the mail-in application.The forger is always aware of his fingerprins, and who is takingand keeping a photograph of him for any reason. This includesgirlfriends, too.

The forger is always aware of where he parks his car, and whosees him in it.

2.

3.

4.

5.

6.

1

3,

Page 128: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

t36

9. The forger avoids personal relationships in cities where he doescrime. It's business.

10. Check protectors are more than worth the effort.11. Bonded credit cards are easy to get and are a must in most fraud

crtrtes.12. The forger uses his ATM card to check on his account before he

goes into banks.

13. Taking a weapon into any bank constitutes arnred robbery,regardless of the person's intentions, or whether or not the weaponis concealed.

14. Magnetic ink is always used on the checks the forger prints.15. It is foolish for the forger to carry nrore than one set of ID on his

person at one tfune.

16. It is best for the forger to avoid taveling by airplane if possible, asair travelers are heavily scrutinized.

17. If the forger must fly, he buys his tickets at an agency. He keeps inmind that check-irn are filnred for security reasons, and luggage isx-rayed.

18. If anested, the forger has approximately 48 hours to make bail andsplit. False ID is not suspected unless there is some reason, and isseldom discovered through a standard arrest. Most times, theauthorities never discover it, and ifthe forger is not annd bail isusually low.

19. It is best to rernember the previous eighteen poinb.

Page 129: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chnpter Twenty TwoThe Last Word (So Far)

137

I would like to tlrow in a word to the wise concerning crimes offraud. It is like any other big business, inasmuch as the money whichhas been stolen or diverted has to go tbrough a bank of sonre kindsornewhere along the line. And most banlcs don't really have hundredsof thousands of dollars just lying around waiting for us to corne in andfree it. So, if the forger perpefrates a crhne that involves the removal ofactual cash from a banh he runs into the sarne problern ttnt a bankrobber does: the cash is just not there. The forger can run all over townand get a little cash from each branch, but it doesn't really arnount tothe total that he could get if the cash were available all in one place.The forgo cannot go into a bank in this country and expect to walk outwith any large amount of cash ("large" being defined as anlthing overten thousand dollars). The system is desigred to give a little to a lot,and when one atternpts to get a lot, the machine goes into overdrive toprevent or deter it from If a custorner asks a teller for anamount of cash over her limit (usually a grand), she must call themanager for an override approval and signature. The manager appears,and the custornetr's request is then scrutinized with the vigor of theGestapo. It goes beyond protecting their interest; it borders on beinginsulting. If I weren't there to steal, I would never do business in anAmerikan bank. They are rude and arrogant, and I love to beat them.

The l"ast Word (So Far)

n

Page 130: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

138

This is the major drawback to big-ticket crinres of fraud, and it's thestopper in all types of crirnes that depend upon getting large amounts ofcash out of a bank. Since the only dependable way to remove cash is insmall incrernents, rnost scarns run out of tinre with only a few hundredgrand as the prize. I have seen many fraud crirps, mine included, thatput a million dollars or rlore in the banh yel only a portion of thatarnount was realized in the end. That is why the forger needs toconcentrate on crirnes that have a ceiling of a couple of hundred grandand the rnethods needed to get that sum oilt of the banls. That is whygood fraud crfunes take such dedicated preparation.

The forger often opens up several bank accounts and a business (ortwo) in the city he plans on hitting. By doing so, he opens up moreavenues to get cash fronr, and thus increases his chances of nettingmore. Since it really involves actually walking into a bank to get thecastr, it quickly becomes obvious that the forger is physically limited injust how many places he can get to in a business day. The idealsituation for the effrcient forger is to plan his route well in advarrce andkeep to his schedule. The forgo can hire people to do this for hinl andthat increases the take. But is it worth it for all of those people to knowthe forger's business and his face? These are not problems which areencountered by the petty criminal, but neither are the arnounts of rnoneyunder discussion. If the forger is not up to addressing the complexitiesof this profession, the sooner he realizes it the better off he will be.

Current white collar penalties are severe, and they are geffing worseevery day. The pubtc is starting to wake up to the arnounts of moneybeing lost in this sector, and the laws are being adjusted accordingly. Ifthe forger acts like a snart criminal, he is considered in a differentcategory than a bank robber or armed robber. In most cases, they willget less tinre than a big{ime forger, because the public fears them less.

Acts of violence are generally poorly planned or spontaneous, and

that's what the system is set up to deal with. Brain cime bothers thefironey institutions, and they are the real heary hitters in the lawbusiness. They want the forger and his ideas off the sreets and out oftheir banks. The forger will most likely get a break the frst tirne he'scaught, if the amount is not too large, but if he gets caught again a

to

Page 131: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Chapter Twenty TwoThe Last Word (So Far)

r39

pattern starts to enrcrge. The terms continuing criminal enterprise andcareer criminal will be applied to the forger, or, indee4 to any form ofcrirne that has employees or requires brains to commit. Once the forgerhas these phrases attached to his record, he is marked for life. Most ofthe escapades I have nrentioned in this book would be considered "braincri.rnes," and the rules are very different than one might thfurlc I am notsaylng that it is not worth it. As far as I am concernd there is no otherway to live than the way one wants to. If that way is by doing crfurp tofunnce one's lifestyle, then the criminal should at least do the crirnes

that pay we[ and keep violence to a minimurn If one can go to jail fordriuing without a license, or not having insurance, or not paylngalirnony, then I think there is sonething more than just a little wrongwith this country's laws. At least my lifestyle justifres the risk.

I believe that family and friends are inrportant: I have both. I also

believe that if a person cannot live the way he wants to, he might as

well be in prison. I do not know what prison is to others, but to nre it isa place to reflect and dream of tomorrow. The one *ring that a personin jail has over his jailers is sonrcthing very hard to explain to sorneone

who has not gone ttnough it. When the dmrs are opened and he isreleased, he experiences a feeling that borders on being born again. It'sa new start or beginning; the air is new, life feels geat, the touch of awonum is like the first tirnerevisited. This is a state of mind that cannoteasily be explaind but can only be felt. Ask a freed prisoner of war, ora soldier who has been long absent; they know the feeling, and thatfeeling is part of the ganre. I have rnade my bed and I sleep very well init. I look forward to things that the average person has grown boredwith. I have a light in my eyes that others cornrnent on. I see it in veryfew others... and I have nevetr seen it in the eyes of a sheep.

It's All Worth It Ircluding the Final Crastr"..

a,t

Page 132: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

140

Back in the game!

Page 133: bitify.com · Created Date: 10/18/2013 4:51:42 PM

An Insider's Guide to (Inwritten RulesCompiled by Jesse M. Greenwald

. t4I

An Insider's Guide

to Unwritten RulesCompiled by Jesse M. Greenwald

Remember: If you haven't spotted the mark in the first half hourat the table, it's you.

1. A thousand friends are not enough, but a single enemy often is.

2. No man's credit is worth as much as his cash.

3. Believe the man - not the oath.

4. If you are the anvil, be patient. If you are the hammer, strike!

5. Nothing weighs less than a promise.

6. If you are forced to bow, bow very, very low, and hold thatbitter memory until you can take revenge.

7. The wife of a careless man is almost a widow.

8. To make a point, try something sharp!

9. Wolves may lose their teeth, but never their nature.

10. Silence makes few mistakes.

.G

Page 134: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

142

11. The wrong choice usually seems the more reasonable.

12. Never make an enemy whom you don't have to.

13. Women, wind, and luck change often.

14. All who snore are not sleeping.

15. Money is always welcome, even if it comes in a dirty sack.

16. Opportunity makes the thief. The thief who has no opportunityto steal calls himself an honest man.

17. A mask has two sides.

18. Occasionally suffer fools, as you may learn something useful.

But never argue with one!

19. You cannot put a good edge on bad steel.

20. Victories are always temporary, as are defeats. Learn fromboth.

21. Perseverance is the key that so few everturn.

22. Fortune smiles... then betrays!

23. A handful of luck is worth more than a truckload of wisdom.

24. If you cannot win, then make the price of your enemy's victoryso exorbitant he never forgets.

25. Open your wallet and your mouth cautiously.

26. Always draw the snake from the hole with another man's hand.

27. Money scammed is twice as sweet as money earned, and often

more so.

28. If you allow your friends or your enemies to think they are your

equals, they will immediately assume they are your superiors.

Page 135: bitify.com · Created Date: 10/18/2013 4:51:42 PM

An Insider's Guide to Unwritten RulesCompiled by Jesse M. Greenwald

r43

29. When skating on thin ice, skate fast!

30. When you are ffigry, close your mouth and open your eyes.

31. Strike first, and you will sfrike last.

32. What goes around, comes around... but just not soon enoughfor most people.

33. Money may not be able to buy happiness, but it provides thetime to search for it.

34. A strategically placed mirror allows for the occasional turn ofthe back.

35. When letting "sleeping dogs" lie, ensure that they are in factsleeping.

36. Tempting those whom you know cannot resist temptationproves nothing you didn't already know, except to those whomyou may not have wished to know it.

37. A man who will not accept your money is accepting som@neelse's,

38. Pay for what you get, and get what you pay for.

39. Enemies with a common cause are still enemies.

40. Partners provide many things, including testimony.

41. No matter how short the skirt, there's always room for a wire.

42. Promises, like wine, will tum to vinegar if handled poorly.

43. An unloaded gun makes a poor club.

44. Love is sfronger than Kevlar, but as fragile as china.

45. When driving down a mountain, check your own brakes.

rc

Page 136: bitify.com · Created Date: 10/18/2013 4:51:42 PM

Document Fraud And Other Crimes Of Deception

t44

46. A friend in need is a friend indeed.

47. Six feet is never deep enough, if more than one dig the hole.

Note: Rules are only effective if you use them, even if it hurts. Ifthey weren't difficult to live by, you wouldn't need them, nowwould you? If you think they are unfair or that you might knowbetter, don't lose any sleep over it. Those who will use them whendealing with you won't.

{**'-\^-*QJesse M. Greenwald

.,4