 Insurance fraud, how it’s committed and how it’s solved, always is an interesting topic. It’s like a crime drama. Whether it’s Castle, The Mentalist, or NCIS, you get to see the end result and then figure out how it happened; and you inevitably learn about a couple of mistakes that help it along and a few more that eventually bring it to an end.  Real-life examples are not always as compelling as highly-rated TV shows but they do illustrate the problem and show what investigators should, and should not, do to bring it to an end.    The ones we will be talking about in this post are Rental Car Fraud, a smart-phone app, and, once again, the Target Data Breach.  They have a lot more in common than you might think.
Insurance fraud, how it’s committed and how it’s solved, always is an interesting topic. It’s like a crime drama. Whether it’s Castle, The Mentalist, or NCIS, you get to see the end result and then figure out how it happened; and you inevitably learn about a couple of mistakes that help it along and a few more that eventually bring it to an end.  Real-life examples are not always as compelling as highly-rated TV shows but they do illustrate the problem and show what investigators should, and should not, do to bring it to an end.    The ones we will be talking about in this post are Rental Car Fraud, a smart-phone app, and, once again, the Target Data Breach.  They have a lot more in common than you might think. 
Rental Car Fraud, a subset of the ever-popular Auto Fraud, is growing at an alarming rate, according to an article in the March 12, 2014 edition of the Claims Journal by Denise Johnson. The concept is simple: rent a series of cars; use them to commit crimes and then dump, and maybe even burn, them when you’re done; and conceal your identity by using fake or stolen ID. The cars are hard to trace and the connections between them even more difficult to figure out. According to Kraig Palmer, an investigator with the California Highway Patrol who recently spoke at the Combined Claims Conference in Orange County, Calif., stolen ID’s are not hard to come by and can be relatively cheap at about $50 each. The fraud is not easy to solve. According to the article, Palmer said he worked on one case that involved 103 vehicles, which resulted in 72 arrests. Another involved 3 main suspects who rented 42 cars from 2 different rental agencies. One of the suspects was a preferred customer, which evidently made it easier for him to rent the cars and harder for the companies to trace him. Those incentive programs reportedly often allow a customer to register on-line without even having to set foot in the rental agency.
There are certain things a claims adjuster or SIU rep should look for when faced with an auto claim for property damage or bodily injury that involves a rental car. Kraig Palmer, according to the Claims Journal story, suggested they look for unusual patterns, such as whether one person rented more than one vehicle involved in the occurrence. Howard J. Hirsch added a few more, which appeared in the January/February 2011 edition of Auto Rental News; though he referred the tips to auto rental counter agents, fraud investigators might be able to use them as well:
- The customer owned a vehicle, but it is not being serviced or repaired [at the time he rents the car].
- The customer inquires about extra insurance before it is offered.
- The customer is a walk-in and does not own a vehicle.
- The customer has a local address and an out of state license.
- The customer only requests a one-day rental.
- The customer pays in cash.
- The customer pays for the rental with someone else’s credit card.
- The customer presents a foreign driver’s license with no passport.
 New York Business Lawyer Blog
							New York Business Lawyer Blog


 There have been a few interesting recent news stories concerning the benefits and dangers of Big Data, for businesses and individuals alike.  One even points out a possible middle ground, which can allow the continued use of the vast amounts of data at the disposal of government and businesses, while protecting individual privacy.
There have been a few interesting recent news stories concerning the benefits and dangers of Big Data, for businesses and individuals alike.  One even points out a possible middle ground, which can allow the continued use of the vast amounts of data at the disposal of government and businesses, while protecting individual privacy. Sometimes you learn something new from unexpected places. Sometimes you have to challenge your assumptions if you want to have any hope of solving an otherwise intractable problem. Sometimes, just because common knowledge is widely accepted, does not mean that it should be. A recent appeal I was working on made this clear.
Sometimes you learn something new from unexpected places. Sometimes you have to challenge your assumptions if you want to have any hope of solving an otherwise intractable problem. Sometimes, just because common knowledge is widely accepted, does not mean that it should be. A recent appeal I was working on made this clear. A recent news story caught my eye because it shows the importance of a win-win negotiation strategy and the need to accurately assess your
A recent news story caught my eye because it shows the importance of a win-win negotiation strategy and the need to accurately assess your  A contract for the sale of goods: one business, or merchant, buys a part from another.  They agree on quantity, price, and delivery. The Seller sends the Buyer a purchase order and delivers the goods, and the Buyer pays.  It all sounds easy, but as we previously said, a lot can go wrong in a
A contract for the sale of goods: one business, or merchant, buys a part from another.  They agree on quantity, price, and delivery. The Seller sends the Buyer a purchase order and delivers the goods, and the Buyer pays.  It all sounds easy, but as we previously said, a lot can go wrong in a  Trial lawyers are problem solvers. That is what they have to do and what their clients expect them to do. The biggest problem they face is how to persuade a jury. After all, the last time a trial went completely as planned was probably the first time one ever did.
Trial lawyers are problem solvers. That is what they have to do and what their clients expect them to do. The biggest problem they face is how to persuade a jury. After all, the last time a trial went completely as planned was probably the first time one ever did.   Advances in business technology are becoming routine, even in the most unexpected places. Each new advance comes with both risks and rewards.  One of the more recent, the mobile payment app, accessed through a customer’s mobile phone, points out how the good and the bad often go hand in hand: big data, marketing, privacy, cybersecurity, biometrics, and liability all wrapped up into one. How to benefit from this technology, without being caught in its snares, is a lesson every business should learn.
Advances in business technology are becoming routine, even in the most unexpected places. Each new advance comes with both risks and rewards.  One of the more recent, the mobile payment app, accessed through a customer’s mobile phone, points out how the good and the bad often go hand in hand: big data, marketing, privacy, cybersecurity, biometrics, and liability all wrapped up into one. How to benefit from this technology, without being caught in its snares, is a lesson every business should learn. Almost every New York Business uses digital information daily and therefore runs the risk of having it stolen.  The potential costs involved are significant and the risks are real. How to protect against the dangers, consequences, and liability arising from data breaches, while still taking advantage of the benefits of using digital information, is a challenge every business, large and small, must become aware of and learn how to meet. In this post we’ll take a look at the dangers involved, and in subsequent posts we’ll examine the available remedies.
	Almost every New York Business uses digital information daily and therefore runs the risk of having it stolen.  The potential costs involved are significant and the risks are real. How to protect against the dangers, consequences, and liability arising from data breaches, while still taking advantage of the benefits of using digital information, is a challenge every business, large and small, must become aware of and learn how to meet. In this post we’ll take a look at the dangers involved, and in subsequent posts we’ll examine the available remedies. Digital information can be both a blessing and a curse for modern day businesses.  It’s seemingly everywhere because, it seems, people leave it everywhere, even unsuspectingly.  Even a little can tell you a lot, if you know where to look. Apparently innocuous information, like where you are at any given moment, can tell more about you, and be more valuable, than you might think. A recent story in the Wall Street Journal drives this point home.
	Digital information can be both a blessing and a curse for modern day businesses.  It’s seemingly everywhere because, it seems, people leave it everywhere, even unsuspectingly.  Even a little can tell you a lot, if you know where to look. Apparently innocuous information, like where you are at any given moment, can tell more about you, and be more valuable, than you might think. A recent story in the Wall Street Journal drives this point home.  There’s an awful lot of data out there in the great big digital universe, and, as everyone should know by now, it can create a record of people’s activities that they may not always fully appreciate.  We’ve previously written about how metadata, when used the right way,
There’s an awful lot of data out there in the great big digital universe, and, as everyone should know by now, it can create a record of people’s activities that they may not always fully appreciate.  We’ve previously written about how metadata, when used the right way,