17-1. 17-2 17 bankruptcy, divorce, identity theft mcgraw-hill/irwin copyright © 2012 by the...
TRANSCRIPT
17-2
17
Bankruptcy, Divorce, Identity Bankruptcy, Divorce, Identity TheftTheft
McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
17-3
Bankruptcy Fraud OverviewThe DOJ Bankruptcy Trustee Manual lists various frauds:
Conceals property from the bankruptcy proceedings. Makes a false oath or account in relation to a bankruptcy case. Makes a false declaration, certification, verification, or statement in
relation to a bankruptcy case. Makes a false proof of claim. Receives a material amount of property from the debtor with intent to
defeat the Bankruptcy Code. Gives, offers, receives, or attempts to obtain money, property, reward,
or advantage for acting or forbearing to act in a bankruptcy case. Transfers or conceals property with the intent to defeat the Bankruptcy
Code. Conceals, destroys, mutilates, or falsifies documents relating to the
debtor's property or affairs. Withholds documents related to the debtor's property or financial
affairs from the standing trustee or other officer of the court.
17-4
Bankruptcy Fraud Penalties
Typical penalty: a maximum of five years in prison or a maximum fine of $250,000, or both, per bankruptcy offense.
Many cases include more various offenses. A typical bankruptcy case could involve false declarations, property concealment, conspiracy, mail fraud and money laundering.
Section 802 of the Sarbanes-Oxley Act (SOX) of 2002: A possible 20 years in prison for one who knowingly alters, destroys, mutilates, conceals … with the intent to impede, obstruct, or influence the investigation or proper administration of any matter within the jurisdiction of any department or agency of the United States or any case filed under title 11, or in relation to or contemplation of any such matter or case.
17-5
Frequent Bankruptcy Frauds
Concealment of assets: the most common type of B fraudFraudulent conveyances involve assist concealment
Petition mills and multiple filing schemes are the second and third most common bankruptcy frauds.
A petition mill typically involves unqualified persons who offer fee-based financial advice, credit counseling, and bankruptcy filing services.
In multiple filing schemes, fraudsters typically file bankruptcy petitions in a number of states using different identities.
Additional forms of bankruptcy fraud include trustee fraud, attorney fraud, forged filings, embezzlement, credit card fraud, and bust-outs.
17-6
Types of Bankruptcy Proceedings
Chapter 7 Applies to both individuals and businesses; designed to completely liquidate the debtor’s assets and discharge the debtor’s liabilities as permitted by the bankruptcy code.
Chapter 9 Applies to municipalities. Chapter 11 Applies to businesses (and sometimes
wealthy individuals) and focuses on working out a creditor payment plan without liquidating the businesses.
Chapter 12 Applies to those in farming and fishingChapter 13 Applies to individuals whose means-tested
income is too large to permit them to file under Chapter 7. Chapter 15 Applies to cross-border cases and certain other ancillary cases.
17-7
Bankruptcy Proceedings
Bankruptcy petitions are filed in federal bankruptcy courts, and the proceedings are administered by DOJ trustees.
Bankruptcy trustees are responsible for maintaining fair and orderly proceedings as well as ensuring compliance with all bankruptcy laws. Trustees have an affirmative obligation to collect and review the required documentation and refer any cases of suspected fraud to the U.S. Attorney’s Office and sometimes to the FBI. They are also responsible for recommending to the U.S. Trustee the filing of a motion with the court for dismissal of the debtor’s petition if the debtor does not cooperate as required or commits fraud, or if the petition is abusive.
17-8
Filing of Documents, Discovery, and the Meeting of the Creditors
The bankruptcy normally includes filing of many schedules, and federal tax returns, and detailed accounting and financial records, as well as financial statements for business debtors.
Additional information can be obtained through discovery. Bankruptcy discovery rules incorporate the federal
discovery rules and give any party in interest the right to obtain a court order to examine any entity involved with the case.
In addition to the discovery process, all bankruptcy proceedings, with few exceptions, require debtors to appear in person at the first meeting of the creditors.
17-9
Sources of Discovery for Concealed Assets
Tax ReturnsBank, Brokerage, and Other StatementsLoan ApplicationsCash Flow AnalysesCredit ReportsPublic RecordsUnusual AssetsConveyances
17-10
Investigations of Businesses
Review all sales records for sources of incomeVerify all vendors Review communicationsScrutinize paymentsVerify the existence of inventories, fixed assets, and all
other assetsStudy previous income tax returns and income statements
for evidence of expenses for patents, R&D, and other intangible assets
Review work in progress and unbilled work
17-11
Bankruptcy Fraud Cases
Taco Bell Franchise Owner Jaweed SiddiquiTwo Texas Business OwnersJoseph James Russo
Cases such as these are normally in the IRS case files because they involve charges of income tax fraud. As mentioned, it is common for bankruptcy fraud to be connected to other related crimes. Many individuals who commit bankruptcy have no idea how many federal laws they are breaking.
17-12
DIVORCE FRAUD
Divorce fraud is similar to bankruptcy fraud. In both, a court may divide the assets of some estate.
As is in the case of bankruptcy, the most common area of fraud connected with divorce is asset concealment.
Finding concealed assets in divorces cases involves the same basic techniques used in bankruptcy cases.
In most states, people involved in divorce cases are required to supply each other and the court complete financial statements. The level of scrutiny could be considerably less than that in bankruptcy cases for the following reasons:
17-13
Divorce Versus Bankruptcy
Divorce attorneys do not always have the financial expertise that many bankruptcy attorneys have.
Bankruptcy cases tend to involve creditors who could be engaged in asset concealment and who possess information-rich credit applications from debtors.
Bankruptcy cases tend to involve fraudulent conveyances and hidden assets immediately prior to the filing. In divorce, however, one spouse could hide assets from the other for many years prior to the filing.
While many bankruptcies genuinely have no assets to hide, divorcing couples are more likely to be solvent and have assets to hide.
17-14
Identity Theft
The fastest growing crime in the United States, identity theft occurs when one person uses another’s personal identifying information, such as driver’s license or SSN, to obtain goods and/or services in the other person’s name.
The problem of identity theft has existed throughout history, but it has become much more prevalent with the advent of the Internet and our electronic society.
17-15
Federal Laws Relating to Identity Theft
The Identity Theft and Assumption Deterrence Act of 1998This was the first major act passed to combat identify theft.
It punishes anyone who…knowingly transfers or uses, without lawful authority, a
means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of federal law, or that constitutes a felony under any applicable state or local law.
Under this act, means of identification is broadly interpreted to include any type of information that can identify a particular individual such as numbers for social security, credit cards, and drivers’ licenses.
17-16
Fair and Accurate Credit Transaction Act of 2003 (FACTA)
Free consumer credit reports
Fraud and active duty alerts
Truncation of identifying numbers
Documents to victims Collection agencies Business compliance Disposal of consumer
reports Notice of consumer rights Credit scores
Disputes of inaccurate information
Negative information in reports by financial institutions
Medical information and consumer reports
Nationwide specialty consumer reporting agencies Workplace investigations
Marketing opt-out requirements
Risk-based pricing
17-17
Identity Theft Penalty Enhancement Act
Congress created the crime of aggravated identity theft-- identity theft, or intended identity theft, committed in connection with certain other listed crimes. The penalty for most crimes listed in it is a mandatory extra two years in prison. Examples of listed crimes include the following:Thefts relating to employee benefit plans.False impersonation of citizenship.False statements in the acquisition of a firearm.Crimes relating to mail, bank, and wire fraud.Crimes relating to nationality and citizenship, passports, and
visas.
17-18
The Internet False Identification Prevention Act of 2000
This act makes selling counterfeit versions of certain official identification cards illegal.
The law also makes it illegal to sell electronic templates for making counterfeit identification cards. There is a potential one-year prison sentence if one fake identification card is made from a given template, but the potential prison sentence increases to 20 years if the template is used to make five or more cards.
Plenty of Web sites and message boards contain instructions on how to make false identification cards. The process is not terribly difficult with a computer.
17-19
Identity Theft and Other Federal Statutes
Many identity theft schemes involve violations of related federal statutes, some of which carry penalties up to 30 years in prison. These statutes include crimes in the areas of computer fraud, credit card fraud, wire fraud, mail fraud, social security fraud, and financial institution fraud. In some cases, laws relating to conspiracy, racketeering, and obstruction of justice may also apply.
Individual state laws also play an important role in the war against identity theft. The FBI cannot possibly prosecute many of the small cases that occur, especially those relating to single crimes committed by individuals not associated with organized crime groups.
17-20
Identify Theft Prevention
People should be aware of possible fraudsters:Dumpster divers and garbage pickers. Shoulder surfers Hackers Company insidersImpersonatorsMail thievesPublic records diggersScammers (includes phishers and phone scammers)Fake ATMPurse snatchers and pickpockets
17-21
Warning Signs of Identity TheftUnauthorized address changes A serious warning sign
is evidence of any type of unauthorized change in a mailing address.
Unauthorized account transactions All monthly statements should be carefully inspected for unauthorized activity. Improper transactions should be immediately reported.
Incorrect information on credit reports Any significant incorrect information on a credit report could indicate identity fraud.
Bill collectors Unfortunately, one of the first symptoms of identity fraud victimization could be phone calls or letters from bill collectors for unknown credit transactions.
17-22
Identity Theft Investigation
Identity thieves can be caught various ways.Tracing The true identities of fraudsters can sometimes be
obtained by using video surveillance records, telephone records, and the Internet methods discussed in the earlier chapter on forensic science to trace them.
Catching thieves in the act In theory, identity thieves can be caught in the act of obtaining or using others’ identity information. This approach is not generally helpful because immediate arrests do not normally take place unless a law enforcement officer happens to be at the scene of the crime.
Controlled delivery This is the strongest and most reliable way to catch identity thieves.
17-23
Identity Theft and Related Crimes
Identity theft is frequently related to a wide array of other financial crimes. For example, one check fraud ring in South Florida operated as follows:Thieves from the group broke into cars and stole purses or
wallets to obtain identity information.Counterfeiters from the group manufactured fake driver’s
licenses and other identification documents and created fake checks made payable to the names of the identity theft victims.
Check passers from the group used fake identification cards and physical disguises to hide their faces from cameras and used bank drive-through tellers to cash the counterfeit checks.
17-24
Damage Control
Details on how to report identity theft and notify creditors and credit bureaus is available on consumer.gov (http://www.consumer.gov/idtheft).
The primary steps that victims of identify theft should take are to report the problem to the major credit-reporting bureaus (using fraud affidavits), place fraud alerts in their credit bureau files, close affected accounts including ones that have been set up fraudulently (again, using fraud affidavits), and file reports with local police and the Federal Trade Commission through its Web site.