FIG/SRG
Systems
Fraud Typologies
Actimize /Guardian
Scopes
100

This document provides the minimum investigation, scope of review, and documentation requirements for the Enterprise Financial Crimes Compliance (EFFC) and Fraud Investigations (FI).

What is the FIG? 

100

This tool is used to conduct research and compile information on DDA account activity. 

What is the DDA inquiry tool? 

100
This type of fraud involves creating counterfeit checks to withdrawal funds from an account illegally. 

What is check fraud? 

100

To review your workbench in Actimize, the dropdown list should be set to this. 

What is Fraud-my cases? 

100

This is the scope used for an Alerted Subject Customer to have unusual activity, except for Mortgage, Automobile, Boat and RV Loan cases.

What is scope 7.6.3? 

200

This is primarily used to house the documentation that supports the investigative details and recommendations described in the GED and/or added as case notes directly to the Actimize Case.

What is the Supporting Documentation Spreadsheet (SDS)?

200

This is a mainframe system used to gather and host customer, account, and transactional data.  This system also hosts statement history, teller transactions, wire transactions, and other transactional data/information.

What is hogan?

200

Frequent changes in account information can be a warning sign of this type of fraud. 

What is account takeover? 

200

This red tab is the link that takes us to our case management system that helps create and organize information related to the investigation.

What is Guardian? 

200

This scope is used for Alerted Victim Customers when the Alerted Accounts were closed at the time Triage assigned the case to Investigations

What is scope 7.6.5.1? 

300

Individuals and/or entities are determined to be this when certain identifiers obtained during the investigation meet the criteria:

Full Name (First and Last), 

Tax Identification Number (SSN/EIN)

Government Issued Identification (ID) (Driver License, State ID, or Passport)

OR 

Partial name with :Date of Birth,  Phone Number,  E-mail Address

What is a known subject? 

300

This application is used to pull copies of check images, statements, and return deposit slips. 

What is CaSTR?

300

This scheme, a perpetrator creates fake accounts or identities to steal money or information from unsuspecting victims. Also known as true name fraud.

What is identify theft?  

300

To begin an investigation in Actimize, you set the case to this step. 

What is AML case-Inv in Process? 

300

This scope is used when the subsequent investigation identifies, specific EVAFE allegations or activity that meets the following EVAFE criteria. 

What is 7.6.6

400

This search must be conducted for all Alerted Customers determined to be Subjects by an Investigator.

What is a TLO search?


400

This is an internal website to look up branch and ATM information 

What is the ATM branch locator? 

400

This exploitation occurs when a family member, friend, or caregiver misuses an elders financial resources for their own benefit. 

What is elder financial exploitation? 

400

This icon is used to attach case documents to our case. 

What is the paper clip icon? 
400

This scope is used when any account where the Customer is classified as either a Commercial or classified as a National No-Stop or No-Stop Account. 

What is 7.6.5.3

500

U.S. Bank may have an obligation to conduct this on accounts identified with suspicious activity that remained open after the length of review scope covered in a prior SAR, unless the risk of continuing activity has been mitigated.

What is an RV90? 

500

This is used to view Reg E Claims and branch maintenance requests. 

What is customer express? 

500

This tactic involves a fraudster posing as a company executive to manipulate employees/vendors into transferring funds. 

What is business email compromise? 

500

This section of Guardian is where notes regarding loss amount, fraud claims, and open-source research should be placed.

What is General Note?

500

This scope is used for victims of a BEC / EAC may be limited to the transactional activity. 


What is 7.6.5.4? 

M
e
n
u