FINANCIAL CRIMES. Lesson Plan and Course Outline. INSTRUCTOR EQUIPMENT/MATERIALS PowerPoint, LCD Projector, Computer, and Handouts
|
|
|
- Edith Dorsey
- 10 years ago
- Views:
Transcription
1 FINANCIAL CRIMES Lesson Plan and Course Outline Instructor Detective Kelly Smith Method of Presentation Lecture Duration 8 Hours Trainee Equipment/Materials Note taking material INSTRUCTOR EQUIPMENT/MATERIALS PowerPoint, LCD Projector, Computer, and Handouts GOAL STATEMENT This course is designed to instruct and assist patrol officers and detectives in the reporting and investigation of financial crimes. The course will also assist officers in identifying current trends and methods of assisting victims, preparing cases for prosecution, identifying different types of financial crimes and how to apply these methods to financial crimes cases. COURSE OUTLINE: I. Introduction to Financial Crimes A. Different types of crimes B. Different investigative methods and approaches to certain crimes II. III. The First Steps of the Investigation A. Review Police Report B. Prioritize individual case for investigation 1. Are there any suspects? 2. Is there any evidence to obtain for an investigation? 3. Are there any witnesses to interview? C. Determine what is needed for each case Evidence A. Types of Evidence 1. Video 2. Bank records 3. Cell phone records 4. Fingerprints, either real or digital 5. Witness and victim statements 6. Computer data from victim or suspect
2 B. How to obtain evidence 1. Phone Subpoena 4. Search warrant IV. Victim A. Establish and maintain contact with victim B. Keep victim informed of progress with case C. Feed back and input from the victim regarding potential suspects D. Obtaining related documentation from the victim 1. Credit card and bank account numbers 2. Copies of statements 3. Copies of any related documentation V. Multi-Jurisdictional Investigations A. Establish contact with any assisting investigative agencies 1. Local law enforcement 2. State Agencies DPS, Attorney General 3. Federal Agencies Secret Service Task Force, FBI, Federal Trade Commission 4. Non-law enforcement Bank investigators, loss prevention personnel B. Establish contact with prosecutors and judges. 1. Legal questions 2. Issuing subpoenas 3. Issuing search warrants 4. Seizure of property and/or assets VI. Case Preparation for Presentation and Prosecution A. Does the case meet the elements of the listed offense? B. Does the case meet the elements of a higher or lower class of offense? C. What is need for presentation in court? videos, power point, statements, evidence, related documentation, Business Records Affidavit
3 FINANCIAL CRIMES LEARNING OBJECTIVES The student will be able to recognize the types of identity crime - Types of identity crimes include identity theft, credit card/access device fraud ( skimming ), check fraud, bank fraud, false identification fraud, and passport/visa fraud. The student will be able to provide a definition of identity crime - Identity crime is the theft or misuse of personal or financial identifiers in order to gain something of value and/or facilitate other criminal activity. The student will be able to identify types of crimes associated with identity crimes - In many instances an identity crime is used as a facilitator, through financing or anonymity, to commit other criminal activities such as mail theft, mail fraud, narcotics/drugs, organized crime, financial fraud (money laundering), mortgage fraud, weapons trafficking, homicide, terrorism, wire fraud, or computer crime/internet intrusions. Identity crimes can begin with other seemingly unrelated crimes such as robbery (e.g. purse snatching or mugging), computer intrusion, mail theft, theft of trash ( dumpster diving ), or theft of documents or information from businesses, medical facilities, hotels, etc. The student will be able to list personal and financial identifiers -Personal identifiers include: name, date of birth, social security number, address, phone number, driver s license number, passport number, mother s maiden name, etc. Financial identifiers include: credit card numbers, bank account numbers, personal identification numbers ( PINs ), insurance account numbers, etc. The student will be able to identify currents trends associated with identity crimes - Some of the current trends associated with identity theft involve the usage of current technologies. This provides a unique challenge for consumers and law enforcement by testing their ability to keep up with technological advances and changes. Some of the more recent scams involve stealing information by listening in on conversations made on cellular phones, surreptitiously reading other people s faxes and s, hacking into computers, conducting telephone and scams, and taking advantage of careless consumers online shopping and banking. The student will be able to recognize how identity crimes occur - 1. Stealing a wallet, purse, briefcase, etc., containing your identification, social security card, credit cards, bankcards or checkbook. 2. Stealing mail, especially your bank and credit card statements, pre-approved credit offers, new checks, or tax information. 3. Complete a change of address form to divert your mail to another location. 4. Rummage through your trash or the trash of businesses to find personal data (also known as dumpster diving ). 5. Fraudulently obtain your credit report by posing as a landlord, employer, or someone else who may have a legitimate need for (and legal right to) the information. 6. Find personal information in your home.
4 7. Obtain personal information that you share on the Internet. 8. Get information from the workplace, in a practice known as business record theft, by stealing files out of offices where you are a customer, employee, patient or student, by bribing an employee who has access to your files, or by hacking into electronic files. 9. Shoulder surfing : looking over your shoulder or from a nearby location as you enter your Personal Identification Number (PIN) at an ATM machine. This practice has gone high-tech, with some thieves utilizing hidden spy cameras positioned near ATMs to observe or record people as they enter their PINs. 10. Many criminals who want to obtain personal data from people online use a technique known as spoofing : the creation of s and websites that appear to belong to legitimate businesses such as established retail companies, financial institutions, and online auctions sites. Consumers receive s from thieves claiming to be legitimate businesses, and are directed to websites that appear to be run by those businesses. The consumers are then directed to enter large amounts of personal data. The thieves sending the s or running the websites actually have no connection with those businesses, and their sole purpose is to obtain the consumers personal data so that they can engage in various fraud schemes. The student will be able to identify techniques used to procure false identification - A wide variety of sources, including bookstores and Internet retailers, provide publications that give criminals step-by-step instructions on techniques for producing false documents. The student will be able to recognize the legal aspects of identity crimes and identify the federal and state statutes dealing with identity crimes - Federal law: 18 U.S.C Identity Theft and Assumption Deterrence Act State Law: Penal Code Fraudulent Use or Possession of Identifying Information (State Jail Felony) Business and Commerce Code, Chapter 20, 35 and 48 - Regulation of Consumer Credit Reporting and Responsibility of Business Owners Code of Criminal Procedure, Article 55.02, Sec.2a Procedure for Expunction The student will be able to define the term security alert, according to the Business Code: Security Alert means a notice placed on a consumer file that alerts a recipient of a consumer report involving that consumer file that the consumer s identity may have been used without the consumer s consent to fraudulently obtain goods or services in the consumer s name. The student will be able to define security freeze, according to the Business Code: Security Freeze means a notice placed on a consumer file that prohibits a consumer reporting agency from releasing a consumer report relating to the extension of credit involving that consumer file without the express authorization of the consumer. The student will be able to list information needed for an ID crime offense report - Taking a written report is vital to the victim(s) because credit bureaus require a police report in order to block fraudulent information and to begin repairing the victim s credit reports. In addition, many financial institutions require a police report with an affidavit of fraud.
5 The student will be able to recognize techniques for educating victims and the public on identity crime - Emphasize the fact that the more a person becomes aware about his/her financial records the better prepared he/she will be if they become a victim of identity crime. Inform the public that they should: Not give out personal information over the phone or on the Internet - this includes their social security number, driver s license number, date of birth, place of birth, home address, mother s maiden name, and any passwords. Limit the amount of personal information on their checks - it is recommended that you do not put your driver s license, identification card or social security number on your checks. Check credit histories and bank records frequently and look for signs of inaccurate or suspicious activity. Keep detailed records of banking, check writing, credit card use, and ATM use Destroy carbon copies of credit card receipts Purchase a home shredder or completely destroy any item that may have personal identifiers rather than discarding them in the trash Note: Some insurance companies offer optional coverage to their policyholders
6 Detective Kelly Smith Grapevine Police Department 307 W Dallas Road Grapevine, TX Employment Longview, White Oak and Fort Worth Police Departments Performed duties as a patrol officer, which included responding to calls for service, taking reports, interviewing witnesses and suspects and processing crime scenes. Grapevine Texas Police Department present I spent 16 years in patrol and the last 5 years in CID investigating Financial Crimes including fraud, credit card abuse, forgery and identity theft. Accomplishments & Memberships January 2008 Deputized by the US Marshall s Office and currently a member of the United States Secret Service Task Force on Financial Crimes Current member of the Fraud Investigator s Association of Texas and Association of Certified Fraud Examiners
SECURITY FREEZE INFORMATION Any consumer in Texas may request a security freeze in writing by certified mail to the credit reporting agency.
SECURITY FREEZE INFORMATION Any consumer in Texas may request a security freeze in writing by certified mail to the credit reporting agency. The credit reporting agency shall not charge a fee to victims
SECURITY FREEZE INFORMATION
SECURITY FREEZE INFORMATION Any consumer in North Dakota may place a security freeze on his or her credit report by making a request by mail to each consumer reporting agency. If the consumer reporting
SECURITY FREEZE INFORMATION
SECURITY FREEZE INFORMATION Any consumer in Tennessee may place a security freeze on his or her credit report by requesting it in writing by certified mail to the credit reporting agency. Beginning January
INTRODUCTION. Identity Theft Crime Victim Assistance Kit
Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change
IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09
IDENTITY THEFT WHAT YOU NEED TO KNOW Created by GL 04/09 Table of Contents 1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do
Identity Theft. Presented By: Information Technology. James Blackwood, Michael Fouts, & Tiffany Mixon
Identity Theft Presented By: Information Technology James Blackwood, Michael Fouts, & Tiffany Mixon What is Identity Theft? How can someone steal your identity? Identity theft occurs when someone uses
Identity Theft. Officer Rob Romey IPD Crime Prevention Officer. [email protected]
Identity Theft Officer Rob Romey IPD Crime Prevention Officer 816-325 325-7643 [email protected] What Is Identity Theft? Identity theft occurs when someone possesses or uses your name, address,
Corona Police Department
By Detective John Alvarez Corona Police Department High Technology Crimes Unit California Penal Code 530.5(a) defines Identity Theft: Every person who willfully obtains personal identifying information,
THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT
THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT Compliments of: Fripp Island Security and FIPOA Security Committee November 2013 1 INTRODUCTION Identity theft is a serious crime. It occurs when your personal
Citi Identity Theft Solutions
Identity Theft what you need to know Citi Identity Theft Solutions At Citi, we want to keep you informed about all of the issues that can affect your financial life. We re bringing you helpful information
Identity Theft Information
Identity Theft Information Houston Police Department Criminal Investigations Command Financial Crimes Unit 713-308-2500 The information contained on this page is intended to assist the citizens of Houston
Protect Your Personal Information. Tips and tools to help safeguard you against identity theft
Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity
MACOMB COUNTY SHERIFF S OFFICE IDENTITY THEFT VICTIM S PACKET
MACOMB COUNTY SHERIFF S OFFICE IDENTITY THEFT VICTIM S PACKET Information and Instructions This packet is to be completed once you have contacted the Macomb County Sheriff s Office and obtained a complaint
Protect Your Personal Information. Tips and tools to help safeguard you against identity theft
Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. WHAT IS IDENTITY
Identity Theft. Emergency Repair Kit
Identity Theft Emergency Repair Kit 2012 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Any duplication or reproduction is strictly prohibited. Identity Theft Emergency Repair
PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit
PROTECT YOURSELF AND YOUR IDENTITY Chase Identity Theft Tool Kit USE THESE IMPORTANT CONTACTS TO KEEP YOURSELF PROTECTED CHASE CONTACTS Customer Protection Group Credit Cards 1-888-745-0091 Other Account
Identity Theft: Knowledge, Preparation, and Planning. Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section
Identity Theft: Knowledge, Preparation, and Planning Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section What is Identity theft? Stealing personal information for economic
PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT
PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT At Chase, we work hard to pro v help prepare you for whatever h Convenient Reference for Important Contacts: Chase Identity Theft Center
PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit
PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If
Identity Theft Protection
Identity Theft Protection Learning Objectives Discuss the aspects of identity theft Discuss the signs of recognizing when your identify has been stolen Understand the steps to take to reclaim your identity
Leander Police Department 705 Leander Dr Leander, Texas 78641 (512) 528-2800
Leander Police Department 705 Leander Dr Leander, Texas 78641 (512) 528-2800 Identity Theft Information and Affidavit The attached Identity Theft Affidavit packet has been given to you because you may
Information to Protect Our Customers From Identity Theft
Our Customers From Identity Theft Identity (ID) Theft Capital One understands that ID Theft is a growing concern of our customers, and that it is a frustrating experience for victims. We share these concerns
EL/Civics Lesson Plan
Program Name Staff Responsible for Lesson MVCTC EL/Civics Program Mary Ann Oatney Date(s) Used 11/2007 Civics Category Civics Objective Time Frame to Complete Lesson EFL(s) II. Civics Participation II.
WICHITA POLICE DEPARTMENT 455 N. Main Wichita, KS 67202
WICHITA POLICE DEPARTMENT 455 N. Main Wichita, KS 67202 INFORMATION AND INSTRUCTIONS The purpose of this packet is to assist you in the investigation related to your identity theft case and should be completed
IDENTITY THEFT: MINIMIZING YOUR RISK
IDENTITY THEFT: MINIMIZING YOUR RISK What is Identity Theft? Identity theft occurs when someone uses another person s information to commit fraud or other crimes. Information such as your name, Social
MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009
MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 Current Laws: A person may not knowingly, willfully, and with
Do s & Don ts Reference website. www.farmersidentityshield.com
What is identity theft? How do thieves steal an identity? What do thieves do with a stolen identity? How can you find out if your identity was stolen? How long can the effects of identity theft last? What
I dentity theft occurs
1.3.1.F1 Identity Family Economics and Financial Education W h at i s I d e n t i t y T h e f t? I dentity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit,
MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009
MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 Current Laws: A person commits the crime of identity theft if
Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity
Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have
Information carelessly discarded into the trash can be stolen when a thief digs through the garbage.
Identity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information. Identity theft can wreak havoc on an individual s credit report, cause
NCUA LETTER TO CREDIT UNIONS
NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA DATE: September 2001 LETTER NO.: 01-CU-09 TO: SUBJ: Federally Insured Credit Unions Identity Theft and
According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection
According to the Federal Trade Commission (FTC): IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information The FTC is a government
identity theft: How To Safeguard Your Privacy and Keep Your Good Name
identity theft: How To Safeguard Your Privacy and Keep Your Good Name Do you know anyone who has been the victim of identity theft? If not, odds are you will soon. According to the Federal Trade Commission,
Protect Yourself From Identity Theft
Protect Yourself From Identity Theft Identity theft occurs when a criminal uses another person's personal information to take on that person's identity. Identity theft is much more than misuse of a Social
I know what is identity theft but how do I know if mine has been stolen?
What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card
Tempe Police Department Victim s Fraud Packet
1 Tempe Police Fraud Packet: Report # - Tempe Police Department Victim s Fraud Packet Do not complete this packet until you have contacted Tempe Police Department to file a report and obtained a police
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 Current Laws: It is unlawful to intentionally use or attempt
Standard 9: The student will identify and explain consumer fraud and identity theft.
TEACHER GUIDE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Priority Academic Student Skills Personal Financial
Identity Theft Grade Level 10-12
Identity Theft Grade Level 10-12 Take Charge of Your Finances Materials provided by: Karen Dawson, Family and Consumer Sciences Educator, Skyview High School, Billings, Montana Time to complete: 75 minutes
OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009
OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009 Current Laws: A person commits the crime of identity theft if the
Client Resources SAFEGUARDING YOUR IDENTITY. Your personal and financial information is precious. Protect it by being savvy about identity theft.
Client Resources SAFEGUARDING YOUR IDENTITY Your personal and financial information is precious. Protect it by being savvy about identity theft. EVERYONE IS AT RISK FOR IDENTITY THEFT. It s an unfortunate
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity
Protection. Identity. What should I do if I m. Common ID Theft TACTICS. a criminal obtains your personal information and uses it for his/her own gain.
Common ID Theft TACTICS. HOW DOES IT HAPPEN? Identity What should I do if I m a Protection PROTECT YOURSELF: OLD-FASHIONED STEALING: Criminals steal your wallet or purse. > Never leave your wallet or purse
Identity Theft Packet
BOULDER POLICE DEPARTMENT 1805 33 rd Street Boulder, CO 80301 Identity Theft Packet ** Use this packet when the crime involves the stealing of someone's identity, such as when a victim finds out that someone
Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com
Bringing enterprise level security to your business Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Matt Malone Fall 2015 Spring 2016 IDENTITY THEFT Identity
Deputy Mike Butler Deputy Leslie Fox Dane County Sheriff s Office
Deputy Mike Butler Deputy Leslie Fox Dane County Sheriff s Office Identity theft occurs when someone uses your personal identifying information such as: A. Your name B. Social Security number C. Credit
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally
T E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S I D E N T I T Y T H E F T G U I D E
T E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S I D E N T I T Y T H E F T G U I D E A I D E N T I T Y T H E F T G U I D E Prepared and distributed as a Public
Employee ID Theft Resource Guide
Employee ID Theft Resource Guide ID Theft Resolution Legal Resources ID Theft Assistance Updates www.legalresources.net ID Theft What is Identity Theft? Identity Theft is a serious crime in which someone
IDENTITY THEFT RESOURCE KIT
IDENTITY THEFT RESOURCE KIT TABLE OF CONTENTS Introduction 2 What To Do Now 3 Key Agencies to Contact 3 Other Important Contacts 4 Action Taken Form 6 Sample Letters 7 How Identity Theft Can Occur 9 What
Protecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................
Beware! Identity Theft
STUDENT MODULE 9.2 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Identity Theft Imagine getting a letter from the Internal
Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.
At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well
FRAUD PACKET. Instructions and Useful Information. Mesa Police Department Attention Financial Crimes PO Box 1466 Mesa, AZ 85211-1466
FRAUD PACKET Instructions and Useful Information Please read entire packet and follow instructions to complete this packet properly. **This packet should ONLY be completed if you are a victim of Identity
IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT
CREDIT What You Should Know About... IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT YourMoneyCounts You may have heard of a crime called identity theft, but
1611 E. PFENNIG LN., P.O. BOX 679 PFLUGERVILLE, TEXAS 78691-0679 PFLUGERVILLE POLICE DEPARTMENT INSTRUCTIONS
IDENTITY THEFT INFORMATION / CREDIT CARD ABUSE PACKET PFLUGERVILLE POLICE DEPARTMENT 1611 E. PFENNIG LN., P.O. BOX 679 PFLUGERVILLE, TEXAS 78691-0679 INSTRUCTIONS The Pflugerville Police Department is
DVD Companion Learning Guide
DVD Companion Learning Guide How to Use This Learning Guide This learning guide is a companion to the DVD, Identity Theft: Outsmarting the Crooks It can be used to guide classroom discussion of the material
SCAM JAM 2011. ID Theft. Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection
SCAM JAM 2011 ID Theft Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection ID Theft The NAME GAME. Don t Get Played! Identity Theft: Learn the basics- What it is. How
Identity Theft. Protecting Your Credit Identity 1.3.1.G1
Identity Theft Protecting Your Credit Identity Identity Theft The dollar loss suffered because of identity theft from consumers was 343 million in 2002. Federal Trade Commission The number of identity
Identity Theft Victim s Packet
Identity Theft Victim s Packet In this packet: Information and Instructions Section 1, # of pages 6 Fair and Accurate Credit Transactions Act of 2003 Section 2, # of pages 3 ID Theft Affidavit Section
Identity Theft: Prevention & Survival
Identity Theft: Prevention & Survival Crime of the Century Provide By: Nick Sabetta Don t t Let Someone Steal Your Good Name What is Identity Theft? When someone uses your personal information without
How To Get A Credit Card From A Fraudulent Account
Information and Instructions This packet is to be completed once you have contacted New York State University Police and obtained a police report number related to your identity theft case. To obtain a
Financial Crime Report
Classification 484(g) PC 530.5 PC ALHAMBRA POLICE DEPARTMENT Financial Crime Report DR Number UCR INSTRUCTIONS 1. If the suspect is known, contact this Department by calling (626) 570-5151. 2. Please provide
What is Identity Theft?
What is Identity Theft? Identity theft is a crime in which someone obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else.
MISSISSIPPI IDENTITY THEFT RANKING BY STATE: Rank 32, 57.3 Complaints Per 100,000 Population, 1673 Complaints (2007) Updated December 21, 2008
MISSISSIPPI IDENTITY THEFT RANKING BY STATE: Rank 32, 57.3 Complaints Per 100,000 Population, 1673 Complaints (2007) Updated December 21, 2008 Current Laws: A person shall not obtain or attempt to obtain
PROTECTION GUIDE Learn the Essentials & Immediate Steps to Protect Your Identity
PROTECTION GUIDE Learn the Essentials & Immediate Steps to Protect Your Identity Identity fraud occurs anytime your personal information is used without your authority and is more than just credit card
Identity Theft Victim s Packet
Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted Lake Oswego Police Department and obtained a police report number related to your identity
IDENTITY PROTECTION MEMBER. Protect Your Identity. Security of Personal Information is Our Top Priority
MEMBER IDENTITY PROTECTION Protect Your Identity Security of Personal Information is Our Top Priority Imagine this Unexpectedly, you get turned down for a loan, you get a call from a collection agency
Lake County Sheriff s Office Identity Theft/Fraud Packet
Gary S. Borders, Sheriff Lake County Sheriff s Office Identity Theft/Fraud Packet Information and Instructions The Information and Instructions portion of this packet is for you to keep and contains information
Avondale Police Department Identity Theft / Fraud / Forgery Victim's Packet
Avondale Police Department Identity Theft / Fraud / Forgery Victim's Packet Information and Instructions This packet should be completed once you have contacted the Avondale Police Department and obtained
