You are on page 1of 8

Secret Service Must Investigate Obama Credit Card Fraud

By JB Williams jb.uspu@gmail.com

The Obama campaign is reporting that it raised a record $181 million in the month of September alone. According to campaign FEC filings for September, the money came from 1.8 million individual donors, many overseas, and over 500,000 of whom had never donated before. Did YOU donate to Obama? You might have, just follow the trail The same thing happened in September of 2008. We later learned that most of that huge cash infusion came from foreign countries, in small denominations, just like September 2012, averaging $53 each from millions of undisclosed donors, most of them abroad. There are Federal Laws making it illegal to accept foreign campaign contributions, yet Obama just took in almost $200 million, most of it from overseas donors. The FEC must immediately investigate the source of these overseas funds. The neat part is who those first time donors are it is YOU. And it is YOU who must demand that the FEC and Secret Service immediately investigate the massive overseas funds pouring into the Obama campaign. The Government Accountability Institute just issued a 109 page report detailing the massive campaign finance fraud taking place in the 2012 campaign.

From the report


Campaigns are not required to disclose donations from individuals who gave less than $200 in a campaign cycle unless the campaign is audited. Furthermore, campaigns do not even need to keep records of those who gave less than $50. Presidential candidates are raising large amounts of money that fall under the $200 threshold and audits are rare unless a campaign accepts federal matching funds. To this date (September 26, 2012), the Romney campaign has raised $58,456,968 and the Obama campaign has raised $271,327,755 in contributions under $200 for the 2012 campaign cycle. In the 2008 presidential elections, the Obama campaign raised $335,139,233 in donations under $200.

A glimpse at campaign finance security


Given the state-of-the art digital sophistication of the Presidents re-election campaignincluding social media, micro-targeting and data-miningits online donation system contains at least three major security vulnerabilities: 1. The absence of the industry-standard CVV and unknown use of AVS anti-fraud security for online credit card donations 2. The presence of a branded, major third party-owned website (Obama.com) redirects its 68% foreign traffic to a campaign donation page 3. Active foreign solicitation using indiscriminate email solicitations and exposure to social media

Specifically: Obama Campaign Lacks the Industry-Standard Level Of Credit Card Security For Donations, But Uses It For Merchandise Purchases: To purchase Obama campaign merchandise, the campaign requires buyers to enter their credit card CVV security code, but does not require the credit card security code to be entered when making an online campaign donation (see page 61). By GAIs estimates, the Obama campaigns failure to utilize industry-standard protections potentially costs the campaign millions in extra processing fees. (with purpose)

The BIG Picture is Massive Fraud


There are reasons why the Obama campaign would use CVV code security technology for merchandising. In short, the CVV code on the back of your credit or debit card is there to ensure that the individual using the card is you, or someone authorized by you to use the card. Most Credit Card fraud does not happen with a stolen card, but rather a stolen card number. Because the fraudster does not actually possess the card, but only the card number and expiration date for the card, they will not have the CVV code on the back of the card in most cases. When the campaign is selling and shipping merchandise, they use CVV code technology to secure each transaction before shipping merchandise. But when nothing is being shipped, as in the case of campaign donations, they have CVV code technology turned off. Why? Because, the transactions coming from overseas on stolen card numbers, will not have the CVV code. They also wont have AVS information, which the Obama campaign also turned off on its donations account. They are stolen card numbers, most of them from Americans. Address Verification, (AVS) like CVV code verification, are industry standards for blocking fraudulent online transactions. Why has the Obama campaign turned off both of those security functions for donations, but not for merchandise orders? With these security functions turned on, the system would DECLINE transactions as fraudulent if they were missing a matching CVV code. So, to allow fraudulent donations on stolen card numbers, they would have to turn off the CVV security function, thereby allowing the fraudulent transactions to APPROVE without any CVV code match.

This raises three obvious questions?


1. Who are these individual donors? (Including via bundlers?) 2. Why are we allowing foreign donations from overseas? 3. How many of those donations are made on stolen U.S. card numbers? Only a full scale investigation into the massive donations from September 2012 (and 2008) can answer these and other questions. However, what we already know is this Obama is not supposed to accept any foreign campaign donations, but he is. The Obama campaign is familiar with and using CVV code technology on merchandise, but not on campaign donations. Without the CVV code, fraudulent donations can be made with stolen card numbers and they are. The CVV code technology was intentionally turned off for Obama donations only. The Secret Service is responsible for investigating and prosecuting Credit Card Fraud.

The Secret Service must immediately investigate the huge sums pouring into the Obama campaign from overseas donors, looking closely at the campaigns misuse of CVV code technology to open the flood gates for fraudulent transactions. The Obama Campaign used these same tactics in 2008, for more than $200 million in foreign unsecure donations from undisclosed donors. Because they are committing fraud in small denominations, $25-$50 each, most American cardholders wont even notice the charge on their statement. Even if they do notice on their next billing statement and issue a chargeback, it wont be until after the election is over. Meanwhile, Obama can take in hundreds of millions in foreign fraudulent transactions billed to stolen U.S. card numbers and use those funds to win re-election. By the time people figure out they donated to Obama when their statement arrives, the election will be over. To raise this issue with Secret Service, contact your closest Field Office. Contact the FEC here and demand an immediate investigation into Obamas foreign campaign contributions. Whether or not the average reader can grasps the gravity of this fraud or not, I can assure you that the Secret Service and F.B.I. fully understand. They know exactly why someone would turn off these standard security features. They know that it represents an intentional opening of the flood gates for fraudulent online donations. What the people need to know is what these Law Enforcement groups are going to do about it and if they are going to do it, before another election is stolen by fraud? Are they loyal to America? Or, to the Commander-in-thief?

Additional information was released at Breitbart In an explosive report set to send shockwaves through official Washington, the Government Accountability Institute (GAI) released a 108-page GAI investigation into the threat of foreign and fraudulent Internet campaign donations in U.S. federal elections (visit campaignfundingrisks.com to download the full report). Breitbart News obtained an advance copy of the bombshell report which reveals that the Obama.com website is not owned by the presidents campaign but rather by Obama bundler Robert Roche, a U.S. citizen living in Shanghai, China. Roche is the chairman of a Chinese infomercial company, Acorn International, with ties to state-controlled banks that allow it to gain revenue through credit card transactions with Chinese banks. Theres more.

The unusual Obama.com website redirects traffic directly to a donation page on the Obama campaigns official website, my.barackobama.com, which does not require donors to enter their credit card security code (known as the CVV code), thereby increasing the likelihood of foreign or fraudulent donations. The website is managed by a small web development firm, Wicked Global, in Maine. One of Wicked Globals employees, Greg Dorr, lists on his LinkedIn page his additional employment with Peace Action Maine and Maine Voices for Palestinian Rights. According to the GAI report, 68 percent of all Internet traffic to Obama.com comes from foreign visitors. And still more. In 2011, Mr. Roche obtained one of the most sought-after pieces of real estate in Washington, DC: a seat at the head table for President Obamas State Dinner for Chinese President Hu Jintao. How Rochea man whose infomercial company hawks fitness equipment, cell phones, and breast enhancement productslanded a seat alongside Secretary of State Hillary Clinton, former President Bill Clinton, Sen. John Kerry, former President Jimmy Carter, and Chinese President Hu Jintao remains unclear. Since 2009, White House Visitor Logs list the name Robert Roche at least 19 times, despite the fact Mr. Roches primary residence is in China. Mr. Roche, who is originally from Chicago, is a co-chair of the Technology Initiative for the Obama campaign. According to Acorn Internationals prospectus, the success of Mr. Roches company hinges on maintaining access to state-run media and preferential tax treatments and subsidies doled out by the Peoples Republic of China (PRC): Our business depends on our access to TV media time to market our products and services in China.PRC law is vague and is subject to discretionary interpretation and enforcement by PRC authoritiesLoss of these preferential tax treatments and subsidies could have material and adverse effects on our results of operations and financial conditions. In addition to the Obama.com redirect revelation, the Government Accountability Institute report America the Vulnerable: Are Foreign And Fraudulent Online Contributions Influencing U.S. Elections?exposes myriad gaping online security holes that stand to threaten the integrity of House, Senate, and presidential elections. Stay tuned to Breitbart News for continuing coverage

The Secret Service and FEC MUST Act Immediately Secret Service Criminal Investigations The United States Secret Service is responsible for maintaining the integrity of the nation's financial infrastructure and payment systems. As a part of this mission, the Secret Service constantly implements

and evaluates prevention and response measures to guard against electronic crimes as well as other computer related fraud. The Secret Service derives its authority to investigate specified criminal violations from Title 18 of the United States Code, Section 3056. Criminal investigations can be international in scope. These investigations include: counterfeiting of U.S. currency (to include coins); counterfeiting of foreign currency (occurring domestically); identity crimes such as access device fraud, identity theft, false identification fraud, bank fraud and check fraud; telemarketing fraud; telecommunications fraud (cellular and hard wire); computer fraud; fraud targeting automated payment systems and teller machines; direct deposit fraud; investigations of forgery, uttering, alterations, false impersonations or false claims involving U.S. Treasury Checks, U.S. Saving Bonds, U.S. Treasury Notes, Bonds and Bills; electronic funds transfer (EFT) including Treasury disbursements and fraud within the Treasury payment systems; Federal Deposit Insurance Corporation investigations; Farm Credit Administration violations; and fictitious or fraudulent commercial instruments and foreign securities. Criminal Investigations The United States Secret Service is responsible for maintaining the integrity of the nation's financial infrastructure and payment systems. As a part of this mission, the Secret Service constantly implements and evaluates prevention and response measures to guard against electronic crimes as well as other computer related fraud. The Secret Service derives its authority to investigate specified criminal violations from Title 18 of the United States Code, Section 3056. Criminal investigations can be international in scope. These investigations include: counterfeiting of U.S. currency (to include coins); counterfeiting of foreign currency (occurring domestically); identity crimes such as access device fraud, identity theft, false identification fraud, bank fraud and check fraud; telemarketing fraud; telecommunications fraud (cellular and hard wire); computer fraud; fraud targeting automated payment systems and teller machines; direct deposit fraud; investigations of forgery, uttering, alterations, false impersonations or false claims involving U.S. Treasury Checks, U.S. Saving Bonds, U.S. Treasury Notes, Bonds and Bills; electronic funds transfer (EFT) including Treasury disbursements and fraud within the Treasury payment systems; Federal Deposit Insurance Corporation investigations; Farm Credit Administration violations; and fictitious or fraudulent commercial instruments and foreign securities. Financial Crimes The Secret Service exercises broad investigative jurisdiction over a variety of financial crimes. As the original guardian of the nation's financial payment systems, the Secret Service has a long history of protecting American consumers and industries from financial fraud. In addition to its original mandate of combating the counterfeiting of U.S. currency, the passage of federal laws in 1982 and 1984 gave the Secret Service primary authority for the investigation of access device fraud, including credit and debit card fraud, and parallel authority with other federal law enforcement agencies in identity crime cases. The Secret Service also was given primary authority for the investigation of fraud as it relates to computers. In the early 1990s, the Secret Service's investigative mission expanded to include concurrent jurisdiction with the United States Department of Justice regarding Financial Institution Fraud. Also during this time,

the Internet and use of personal computers became commonplace and expanded worldwide. The combination of the information revolution and the effects of globalization caused the investigative mission of the Secret Service to expand dramatically. As a result, the Secret Service has evolved into an agency that is recognized worldwide for its investigative expertise and for its aggressive and innovative approach to the detection, investigation and prevention of financial crimes. On October 26, 2001, President Bush signed into law H.R. 3162, the USA PATRIOT Act. The U.S. Secret Service was mandated by this legislation to establish a nationwide network of Electronic Crimes Task Forces (ECTFs). The concept of the ECTF network is to bring together not only federal, state and local law enforcement, but also prosecutors, private industry and academia. The common purpose is the prevention, detection, mitigation and aggressive investigation of attacks on the nation's financial and critical infrastructures. The following are primary offenses investigated by the Secret Service: Identity Crimes - Identity crimes are defined as the misuse of personal or financial identifiers in order to gain something of value and/or facilitate other criminal activity. The Secret Service is the primary federal agency tasked with investigating identity theft/fraud and its related activities under Title 18, United States Code, Section 1028. Identity crimes are some of the fastest growing and most serious economic crimes in the United States for both financial institutions and persons whose identifying information has been illegally used. The Secret Service records criminal complaints, assists victims in contacting other relevant investigative and consumer protection agencies and works with other federal, state and local law enforcement and reporting agencies to identify perpetrators. Identity crimes investigated by the Secret Service include, but are not limited to, the following: Credit Card/Access Device Fraud (Skimming) Check Fraud Bank Fraud False Identification Fraud Passport/Visa Fraud Identity Theft Counterfeit and Fraudulent Identification - The Secret Service enforces laws involving counterfeit and fraudulent identification which means, where someone knowingly and without lawful authority produces, transfers or possesses a false identification document to defraud the U.S. Government. The use of desktop publishing software/hardware to counterfeit and produce different forms of identification used to obtain funds illegally remains one of the Secret Service's core violations.

Access Device Fraud - Financial industry sources estimate annual losses associated with credit card fraud to be in the billions of dollars. The Secret Service is the primary federal agency tasked with

investigating access device fraud and its related activities under Title 18, United States Code, Section 1029. Although it is commonly called the credit card statute, this law also applies to other crimes involving access devices including debit cards, automated teller machine (ATM) cards, computer passwords, personal identification numbers, credit card or debit card account numbers, long-distance access codes, and the Subscriber Identity Module (SIM) contained within cellular telephones that assign billing. Computer Fraud - Title 18 of the United States Code, Section 1030, authorizes the Secret Service to investigate computer crimes. Violations enforced under this statute include unauthorized access to protected computers, theft of data such as personal identification used to commit identity theft, denial of service attacks used for extortion or disruption of e-commerce and malware (malicious software) distribution to include viruses intended for financial gain. The proliferation of the Internet has allowed the transition of traditional street crimes to flourish in the anonymity of cyberspace. The borders of a state or a country are no longer boundaries for cyber criminals to reach their victims. As a result of advancements in technology, the Secret Service established the Electronic Crimes Special Agent Program (ECSAP) and a network of Electronic Crimes Task Forces throughout the United States. Agents assigned to ECSAP are computer investigative specialists, qualified to conduct examinations on many types of electronic evidence, including computers, personal data assistants, telecommunications devices, electronic organizers and other electronic media. ECSAP is the only program of its kind in the country with the level of expertise and culture of partnership-building with stakeholders across the spectrum of critical infrastructure. The Secret Service's Electronic Crimes Task Force and Electronic Crimes Working Group Initiatives seek to prioritize investigative cases that involve some form of electronic crime. These initiatives provide needed support and resources with field investigations that have any one of the following criteria: Significant economic or community impact Participation of organized criminal groups involving multiple districts or transnational organizations Use of schemes involving new technology The task force/working group model brings together state and local law enforcement, prosecutors, private sector interests and academia in an effort to prevent cyber-crime and identity theft. Forgery - Hundreds of millions of government checks and bonds are issued by the United States each year. This large number attracts criminals who specialize in stealing and forging checks or bonds from mail boxes in apartment complexes and private homes. During a fraudulent transaction, a check or bond thief usually forges the payee's signature and presents false identification. Money Laundering - The Money Laundering Control Act makes it a crime to launder proceeds of certain criminal offenses, called "specified unlawful activities," which are defined in Title 18, United States Code, Sections 1956 & 1957; as well as Title 18, United States Code, Section 1961 (Racketeer Influenced and Corrupt Organizations Act). The Secret Service monitors money laundering activities

through other financial crimes such as financial institution fraud, access device fraud, food stamp fraud and counterfeiting of U.S. currency. Electronic Benefits Transfer Fraud - Congress enacted the Food Stamp Act of 1977 to provide nutritional food to low-income families. It further directed the Secret Service to aggressively pursue fraud in the food stamp program. The possession or use of food stamp coupons, "Authorization to Participate" cards or Electronic Benefit Transfer cards by unauthorized persons compromises the integrity of the Food Stamp Program and is a criminal violation of the Food Stamp Act. Please visit http://www.fns.usda.gov/fsp for further information regarding the Food Stamp Program and the Electronic Benefits Transfer cards. Asset Forfeiture - The seizing and forfeiture of assets is a byproduct of the Secret Service's criminal investigations. As a result, the Secret Service, through its asset forfeiture program, provides assistance to investigative offices by supplying direction, expertise and temporary support personnel, as needed, in criminal investigations seizure and during the seizure and the forfeiture of assets. Advance Fee Fraud- The perpetrators of advance fee fraud, known internationally as "4-1-9 fraud" (after the section of the Nigerian penal code which addresses these schemes), are often very creative and innovative. A large number of victims are enticed into believing they have been singled out from the masses to share in multi-million dollar windfall profits for no apparent reason. If you have received an e-mail or fax from someone you do not know requesting your assistance in a financial transaction, such as the transfer of a large sum of money into an account, or claiming you are the next of kin to an wealthy person who has died, or the winner of some obscure lottery, DO NOT respond. These requests are typically sent through public servers via a generic "spammed" e-mail message. Usually, the sender does not yet know your personal e-mail address and is depending on you to respond. Once you reply, whether you intend to string them along or tell them you are not interested, they will often continue to e-mail you in an attempt to harass or intimidate you. If you receive an unsolicited e-mail of this nature, the best course is to simply delete the message. Due to a number of aggravating circumstances -- the use of false names, addresses, stolen/cloned/prepaid cell phones and remote e-mail addresses -- verifying the location of and subsequent prosecution of these persons or groups is difficult. The act of sending an e-mail soliciting your assistance in a financial transaction is not a crime in itself. The installation of a credible spam filter and contacting your Internet Service Provider may help deter these unsolicited e-mails. However, there is currently no available program to completely block these types of messages. If you have suffered a significant financial loss related to advance fee fraud, please contact your local Secret Service field office. Telephone numbers are available in the Field Office Directory on this website or may also be found on the inside cover of your local telephone directory. Any investigation regarding this type of fraud will be conducted on a case by case basis at the discretion of the local Secret Service office and U.S. Attorney's Office. _____________________________________________________________________________________

You might also like