"We have a new kind of video camera for the investigator. But, we are not the ones filming, photographing and documenting our cases. The world is filming and photographing for us."
Content across the web multiplies exponentially. Mining this data yourself can be time consuming and expensive. Trained investigators are now using proprietary web search technology, social media sites and professional investigative techniques to uncover public data from the web. However, this information and technology change quickly. Understanding these shifts, investing in these changes and preparing for the future (especially as it pertains to mobile data or "pocket technology") is more important than ever.
In the last five years, most professional insurance investigators figured out the "trusty" desktop computer. They set up social media accounts on Facebook and Twitter, and started to explore investigations online. We were all excited when we found a few claimants on Facebook and used their public posts to mitigate exposure on a claim. What followed was a social media explosion in insurance investigations.
Insurance companies now employ dedicated special investigation unit (SIU) analysts who scour the Internet for data. A new set of industry vendors have proclaimed themselves "technology geeks" and burst onto the scene to fill in the gaps. Social media checks are now a routine part of claims investigations, background investigations, litigation and surveillance.
However, in 2014, social media is packing up and leaving the "trusty" old desktop. Mobile operating systems are now the preferred method of social media interaction. Unfortunately, most investigators are not aware of or prepared to investigate "pocket technology."
Society has become increasingly narcissistic as even the most modest individuals seem to have a field day revealing the minutia of their lives. But this information is now flowing from highly mobile devices such as iPhones, android devices, tablets and iPads. Users, especially younger ones, are less likely to be found on computers. They communicate in 140 character micro blogs, and their messages are filled with abbreviations and #tags. Understanding this communication is the equivalent of learning a new language.
In early 2014, more than 72 million Americans accessed social networking sites or blogs via their mobile devices. This figure represents a 37 percent jump from the same time last year, according to data compiled by comScore. The bottom line: Social networking via mobile devices is on the rise. Investigators are not prepared for this shift and are missing information. If company investigators are not exploring these platforms, investing in the tools to conduct the investigations, and constantly tracking the shifts in technology, they may be neglecting a significant amount of investigative information.
A little more than two-thirds of the time users spend on Facebook is through a mobile device. Image-heavy platforms like Pinterest and Yahoo's Tumblr are primarily mobile too, as well as Snapchat, Instagram and Twitter's video tool Vine. These sites are also the preferred method of communication for the younger generation.
Instagram is one of the fastest growing photo and video sharing sites around. It has exceptional geo tagging capability and it maps the users' interactions as they post and check in. It was originally launched as an iPhone-only application and now supports Android phones. Recently, Instagram introduced a web interface, but the interaction and search capability is limited compared to the capabilities found in the iOS and Android platforms.
It is undeniable, the investigative shift is on. Investigators who don't know the difference between iOS7 and Android 4.4 need to put on their reading glasses and start learning. Online searches need to be augmented with searches based on a mobile device or a mobile operating system. Because the applications are based on location settings, GPS spoofing technology is required for accurate searches and investigations. For instance, if someone wants to investigate a claim in Pittsburgh and is based in California, he needs to make his device think it's in Pittsburgh to get the best results. From his desk he can figuratively park his GPS on a particular location and let the application look for results.
Of course, after an investigative target is located there are new challenges to gathering mobile data, and investigators will require some degree of training and technical expertise. The investigator needs to capture the mobile data using various mobile screen shot applications and PDF tools. Data tags, geo tagging information, URLs and IP addresses need to be documented so that findings can be reproduced later. If there is litigation or criminal prosecution, this data will be required for subpoenas, discovery and search warrants.
Do you know who I am?
False identities, monikers, duplicate accounts and avatars are also prevalent online. The most important part of an investigation will be to independently verify identity and directly link the information to a specific case. The tool to use in this scenario is link analysis. Through link analysis you can identify key players, friends, relationships and geo tagging information. If hiring a vendor to conduct the investigations, it is important to ask their specific capabilities, investigative processes and chain of custody documentation. If conducting these investigations "in house," invest in additional mobile-based platforms and training to assist the analyst. The data gathered and the investment in the technology is worthless unless the information can be used in court.
Not convinced? Let's consider the following case study. Hurricane Sandy was the deadliest and most destructive hurricane of the 2012 Atlantic hurricane season. It was the second costliest hurricane in United States history. Insurers were hit with significant claims exposure. One company was contacted by a client that noticed a significant number of Pennsylvania insured vehicles that were flooded along the New York and New Jersey coastline during Sandy.
The carrier suspected that many of these flooded insured vehicles were not principally garaged in Pennsylvania as stated in their insurance policies. The carrier referred several cases to our firm for investigation.
One specific case involved a car that was flooded in the New York city area, but was listed on the insurance policy as principally garaged at an address in Pennsylvania. Traditional online searches yielded limited information. However, when we switched the search to an android-based platform, we found an alternate moniker associated with the insured. This moniker was used to locate his Instagram account.
The Instagram site was filled with pictures, check-ins and geo-tagging information in New York. It was literally a road map to his activities for several months before and after the claim. It included a geo-tag of his "home" in New York. From there we identified and captured five videos from his YouTube channel. The insured, who had claimed to be a Pennsylvania resident, broadcast and posted real time storm damage of "his home" located on the New York shore along with his flooded car floating down the street during the storm. This information was passed along to the carrier's SIU. The SIU independently verified our findings and positively identified the insured as a New York resident and homeowner. His application for insurance, claim affidavit and claim documents contained inaccurate and misleading information regarding his residence and garaging address. As a result, the insured was later charged criminally in Pennsylvania for insurance fraud.
Some key information to take away from this case:
-
Traditional web and desktop searches are not adequate. Use pocket technology to drill down, identify monikers, investigate mobile-based social media, gather geo tags and build case information.
-
Geo tagging information is more prevalent and generally easier to find on mobile-based social media sites.
-
Social media investigations should not be limited to injury and disability claims. They can be used for property claims, homeowner claims, theft claims, auto claims and premium fraud/avoidance.
-
Younger users are less likely to be on desktop applications and will primarily use mobile applications or pocket technology.
-
Social media analysis is a tool, but not the complete investigation. Every aspect of the investigation must be verified before a claim decision is made.
-
These investigations are often more efficient and less costly than sending an investigator out into the field.
Undeniably, the use of social media has boomed in the last 10 years. In a matter of minutes, social media can make someone famous, infamous but almost never anonymous. As a result, investigations are better and there is a new tool to add to our bag of tricks. Inevitably, technology changes and investigative processes need to follow. Recognize that the shift from the computer to mobile devices is "on." Embrace the "technology geek" or consultant as part of the professional investigative staff. Don't be afraid to make the changes, train up, reduce expenses and clear claims investigations more efficiently by taking advantage of pocket technology.
Want to continue reading?
Become a Free PropertyCasualty360 Digital Reader
Your access to unlimited PropertyCasualty360 content isn’t changing.
Once you are an ALM digital member, you’ll receive:
- Breaking insurance news and analysis, on-site and via our newsletters and custom alerts
- Weekly Insurance Speak podcast featuring exclusive interviews with industry leaders
- Educational webcasts, white papers, and ebooks from industry thought leaders
- Critical converage of the employee benefits and financial advisory markets on our other ALM sites, BenefitsPRO and ThinkAdvisor
Already have an account? Sign In Now
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.