This document provides the minimum investigation, scope of review, and documentation requirements for the Enterprise Financial Crimes Compliance (EFFC) and Fraud Investigations (FI).
What is the FIG?
This tool is used to conduct research and compile information on DDA account activity.
What is the DDA inquiry tool?
Erasing information on valid check and replacing it with new information i.e payee name, amount, or signature
What is an altered check? Also check fraud
To review your workbench in Actimize, the dropdown list should be set to this.
What is Fraud-my cases?
This is the scope used for an Alerted Subject Customer to have unusual activity, except for Mortgage, Automobile, Boat and RV Loan cases.
What is scope 7.6.3?
This is primarily used to house the documentation that supports the investigative details and recommendations described in the GED and/or added as case notes directly to the Actimize Case.
What is the Supporting Documentation Spreadsheet (SDS)?
This is a mainframe system used to gather and host customer, account, and transactional data. This system also hosts statement history, teller transactions, wire transactions, and other transactional data/information.
What is hogan?
This type fraud occurs when cybercriminals gain unauthorized access to a legitimate user's online account, often by stealing their login credentials, and then use the account for malicious purposes like making fraudulent transactions, changing personal information, or stealing sensitive data.
What is a account takeover fraud?
This red tab is the link that takes us to our case management system that helps create and organize information related to the investigation.
What is Guardian?
This scope is used for Alerted Victim Customers when the Alerted Accounts were closed at the time Triage assigned the case to Investigations
What is scope 7.6.5.1?
Individuals and/or entities are determined to be this when certain identifiers obtained during the investigation meet the criteria:
Full Name (First and Last),
Tax Identification Number (SSN/EIN)
Government Issued Identification (ID) (Driver License, State ID, or Passport)
OR
Partial name with :Date of Birth, Phone Number, E-mail Address
What is a known subject?
This application is used to pull copies of check images, statements, and return deposit slips.
What is CaSTR?
This scheme, involves using stolen or fake identities to obtain a loan or account.
The true individual will inform us if they never created or opened an account with USB.
What is identify theft?
To begin an investigation in Actimize, you set the case to this step.
What is AML case-Inv in Process?
This general scope is used when the subsequent investigation identifies, specific EVAFE allegations or activity that meets the following EVAFE criteria.
What is 7.6.6
This search must be conducted for all Alerted Customers determined to be Subjects by an Investigator.
What is a TLO search?
This is an internal website to look up branch and ATM information
What is the ATM branch locator?
On 05/15/2025, 1 ACH credit totaling $10,066.59 was received and 3 Zelle debits totaling $6,000.00 were initiated on a USB account. Account is closed to date. The credit was sent from ABC bank, with merchant FAB, the intended recipient of the payment was DAJON BOYD who is not associated with the USB account. What type of fraud is this?
What is ACH fraud?
This icon is used to attach case documents to our case.
This scope is used when any account where the Customer is classified as either a Commercial or classified as a National No-Stop or No-Stop Account.
What is 7.6.5.3
U.S. Bank may have an obligation to conduct this on accounts identified with suspicious activity that remained open after the length of review scope covered in a prior SAR, unless the risk of continuing activity has been mitigated.
What is an RV90?
This is used to view Reg E Claims and branch maintenance requests.
What is customer express?
This is a type of credit fraud where fraudsters acquire credit and then quickly max out their accounts with no intention of repayment. This scam can involve opening multiple accounts, making regular payments to build a positive credit history, and then disappearing after draining the available credit.
What is bust-out fraud?
This section of Guardian is where notes regarding loss amount, fraud claims, and open-source research should be placed.
What is General Note?
This scope is used for victims of a BEC / EAC may be limited to the transactional activity.
What is 7.6.5.4?