Investigations (2024)

Image

Investigations (1)

Investigations (2)

The U.S. Secret Service has a long and storied history of safeguarding America’s financial and payment systems from criminal exploitation. The agency was created in 1865 to combat the rise of counterfeit currency following the Civil War. As the U.S. financial system has evolved - from paper currency to plastic credit cards to, now, digital information - so too have our investigative responsibilities.

Today, Secret Service agents, professionals, and specialists work in field offices around the world to fight the 21st century’s financial crimes, which are increasingly conducted through cyberspace. These investigations continue to address counterfeit, which still undermines confidence in the U.S. dollar, but it is credit card fraud, wire and bank fraud, computer network breaches, ransomware, and other cyber-enabled financial crimes, that have become the focus of much of the Secret Service investigative work.

Types of Crimes We Investigate

Unauthorized access to computers or networks, using malware, compromised access credentials, phishing, or similar methods. Network intrusions are typically performed to gain access to systems and exfiltrate sensitive information to exploit for financial gain. Network intrusions are also used to block access to computers, networks, or critical infrastructure until a ransom is paid. Ransoms are typically demanded in cryptocurrency.

Counterfeiting of United States currency, bonds, checks, and other financial obligations and securities. Distributing or passing of counterfeited, forged, or altered U.S. currency and other financial obligations and securities. Criminals sometimes use online forums to sell bulk counterfeited U.S. or foreign currency.

Financial transactions that attempt to disguise the proceeds or nature of financial crimes, cyber fraud, or other illegal activities. Specialized criminal organizations may offer money laundering as a service to other criminals. Money laundering organizations sometimes use networks of witting and unwitting money mules, who become part of the process to disguise the flow of money. Money laundering often includes mixing traditional currencies and cryptocurrencies.

Unauthorized access to payment card processing terminals or cashier systems that facilitate electronic transactions for goods or services. These compromises typically focus on exfiltrating payment card data for exploitation of sensitive information for financial gain or resale to other criminals.

Fraud involving the use of payment cards, to include debit and credit cards, or other devices that enable electronic funds transfers. Relevant activities include ATM cashouts, skimming, and similar criminal exploitation of payment systems. Access device fraud also includes exploitation of public assistance programs, such as Electronic Benefits Transfers (EBTs).

Compromised networks or computer systems, typically large-scale, under the control of a cybercrime organization. Botnets may be used by criminal organizations to exploit the compromised host machines with an intent to steal sensitive banking information or register criminal accounts.

The theft and unauthorized use of Personally Identifiable Information (PII). This includes criminals utilizing other people’s identities for credit card and bank fraud, or other financial gain. Criminals also steal PII by compromising networks and exfiltrating sensitive information in bulk, which is then used or resold to other criminals for financial exploitation.

Unauthorized bank transfers to criminal accounts via means such as social engineering and phishing techniques. Criminals may deceive employees responsible for payments by impersonating executives or vendor representatives, who unwittingly transfer the funds to the criminals.

Crimes using social engineering and deception to entice or exploit victims for financial gain. Enticement includes romance and investment schemes, to include scams known as "pig butchering." Extortion involves threats to expose a victim, typically with sexually compromising information.

Online sexual exploitation and abuse by predators and other criminals, sometimes for financial gain.

Investigations (3)

Counterfeit Investigations

Investigations (4)

The Secret Service was formed in 1865 to investigate counterfeit currency during the civil war, as it presented a national security issue. Over time, the Secret Service investigative mission expanded.

Financial Investigations

Investigations (5)

As the original guardian of the nation’s financial payment systems, the Secret Service has a long history of protecting American consumers and industries from financial fraud and payment scams.

Investigations (6)

Investigations (7)

Cyber Investigations

Investigations (8)

The Secret Service is world-renowned for performing some of the most complex, technical investigations into financially-motivated cybercrime organizations threatening the global financial infrastructure.

Internet Crimes Against Children

Investigations (9)

The Secret Service is dedicated to combatting online child sex abuse and was the first federal agency to partner with the National Center for Missing and Exploited Children (NCMEC) in 1997.

Investigations (10)

Investigations (11)

Forensic Expertise

Investigations (12)

We have a cadre of experts in various forensic areas applicable to our integrated investigative and protective missions, ranging from forensic chemists to network intrusion specialists.

Most Wanted Fugitives

Investigations (13)

View of a list of the Secret Service’s Most Wanted Fugitives. Submit tips if you think you can assist with apprehension.

Investigations (14)

Investigations (15)

Seeking Information

Investigations (16)

The Secret Service is actively soliciting information from the public concerning various criminal organizations and identifiers currently the subject of investigation.

Avoid Scams

Investigations (17)

Learn how to protect yourself from various types of scams and fraudulent schemes.

Investigations (18)

Office of Investigations Strategy FY2021-2027

Annual Report FY2023

Latest Press Releases

Investigations (2024)
Top Articles
FedEx | System Down
153 Placement of Postage | Postal Explorer
Po Box 7250 Sioux Falls Sd
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
Uca Cheerleading Nationals 2023
Brady Hughes Justified
Occupational therapist
Jesus Calling December 1 2022
Activities and Experiments to Explore Photosynthesis in the Classroom - Project Learning Tree
Pickswise the Free Sports Handicapping Service 2023
Jcpenney At Home Associate Kiosk
Top Hat Trailer Wiring Diagram
Goldsboro Daily News Obituaries
Craigslist Jobs Phoenix
New Mexico Craigslist Cars And Trucks - By Owner
Thotsbook Com
Sivir Urf Runes
Teenleaks Discord
Unit 33 Quiz Listening Comprehension
Inside the life of 17-year-old Charli D'Amelio, the most popular TikTok star in the world who now has her own TV show and clothing line
Lowes Undermount Kitchen Sinks
Scout Shop Massapequa
Busted Mcpherson Newspaper
Employee Health Upmc
Www.paystubportal.com/7-11 Login
Elbert County Swap Shop
Shoe Station Store Locator
What Sells at Flea Markets: 20 Profitable Items
Unity Webgl Car Tag
Keshi with Mac Ayres and Starfall (Rescheduled from 11/1/2024) (POSTPONED) Tickets Thu, Nov 1, 2029 8:00 pm at Pechanga Arena - San Diego in San Diego, CA
Restored Republic
Club Keno Drawings
Que Si Que Si Que No Que No Lyrics
47 Orchid Varieties: Different Types of Orchids (With Pictures)
Bus Dublin : guide complet, tarifs et infos pratiques en 2024 !
Gwu Apps
Craigslist Georgia Homes For Sale By Owner
Myanswers Com Abc Resources
Pokemon Reborn Locations
Wo ein Pfand ist, ist auch Einweg
3 Zodiac Signs Whose Wishes Come True After The Pisces Moon On September 16
Mbfs Com Login
Here's Everything You Need to Know About Baby Ariel
Csgold Uva
RubberDucks Front Office
This Doctor Was Vilified After Contracting Ebola. Now He Sees History Repeating Itself With Coronavirus
Ups Customer Center Locations
Barback Salary in 2024: Comprehensive Guide | OysterLink
Inside the Bestselling Medical Mystery 'Hidden Valley Road'
Craigslist Farm And Garden Missoula
Wayward Carbuncle Location
Latest Posts
Article information

Author: Domingo Moore

Last Updated:

Views: 6010

Rating: 4.2 / 5 (73 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Domingo Moore

Birthday: 1997-05-20

Address: 6485 Kohler Route, Antonioton, VT 77375-0299

Phone: +3213869077934

Job: Sales Analyst

Hobby: Kayaking, Roller skating, Cabaret, Rugby, Homebrewing, Creative writing, amateur radio

Introduction: My name is Domingo Moore, I am a attractive, gorgeous, funny, jolly, spotless, nice, fantastic person who loves writing and wants to share my knowledge and understanding with you.