Financial Crimes Enforcement Network
|
|
|
- Iris Nichols
- 10 years ago
- Views:
Transcription
1 1
2 Identity Theft Trends, Patterns, and Typologies Reported in Filed by Depository Institutions January 1, 2003 December 31, 2009 October 2010 i
3 Table of Contents INTRODUCTION 1 EXECUTIVE SUMMARY 3 METHODOLOGY 5 GENERAL STATISTICS 6 TYPOLOGIES, TRENDS AND PATTERNS 8 Credit Card Fraud 9 Attempts to Become Authorized Purchasers 10 Private Label Cards 11 Accounts Opened under Business Names 11 Loan Fraud 12 Auto Loan Fraud 12 Mortgage Loan Fraud 13 Consumer Loan Fraud 14 Depository Account Fraud 15 Prepaid Cards and Probable Tax Refund Fraud 16 Fraud and Identity Theft Rings 17 Abuse of Employee and Customer Database Information 18 Geographical Data 18 Means of Theft Discovery 28 Methods of Theft Faciliation 28 Timing of Discovery, Victim Harm, Abused Accounts, and Mitigation 29 Timing of Discovery 29 Victim Harm 30 Abused Accounts 30 Mitigation 30 Red Flags 31 Filings of Special Note 32 NEXT STEPS 36 ii
4 INTRODUCTION Identity theft is a crime rarely committed as an end in itself. Instead, identity theft is nearly always a means of facilitating another crime usually a financial crime that enriches the perpetrator at the expense of individuals, businesses, financial institutions, or government agencies. Reports of identity theft have been increasing for more than a decade. FinCEN highlighted this trend found in depository institution Suspicious Activity Report (SAR) filings as early as June 2001 in its semi-annual publication The SAR Activity Review: Trends, Tips and Issues. 1 The continuing upward trend in identity theft reporting prompted FinCEN to add identity theft as a characterization of suspicious activity on its depository institution SAR form (SAR) in July 2003 and on its securities and futures industries SAR form (SAR-SF) in May Other federal agencies have also reported on identity theft. For example, in November 2007, the Federal Trade Commission (FTC) published the results of a study intended to gauge the impacts that identity theft has had on the general public. 2 In April 2007, The President s Identity Theft Task Force released a report on identity theft typologies and their scope, and on potential remedies to lessen the incidence of identity theft. 3 Subsequently, the U.S. Department of the Treasury, the federal banking agencies, and the FTC jointly issued Identity Theft Red Flag Reporting Rules for all businesses holding customer financial accounts potentially vulnerable to identity theft. 4 The rules went into effect on November 1, See pages at 2. Federal Trade Commission Identity Theft Survey Report, November Prepared by Synovate. See This study used data derived from a national telephone survey of several thousand randomly selected adults. This data collection methodology was chosen because individuals reporting identity theft to the FTC represent only an estimated 4 percent of all identity theft victims; generally only those who follow FTC guidelines to the letter. Consequently, the FTC did not believe that a sampling of this group would comprise a representative sample of all identity theft victims. 3. Combating Identity Theft A Strategic Plan, The President s Identity Theft Task Force, April See CFR Part 681- Identity Theft Rules. Also see pages of the October 2008 issue of The SAR Activity Review Trends, Tips & Issues at 1
5 Previous studies of identity theft have been based on survey responses. The FTCcommissioned study and other authoritative private industry identity theft studies relied upon data collected in scientifically-designed telephone surveys conducted with members of the general public. In contrast, this study is based upon the content of identity theft-related SAR filings submitted by depository institutions Future FinCEN reports will describe trends and patterns in identity theft-related SARs filed by the securities and futures industry, by casinos, and by money services businesses. 2
6 EXECUTIVE SUMMARY Identity theft was the sixth most frequently reported characterization of suspicious activity within the period of the study, behind structuring/money laundering, check fraud, mortgage loan fraud, credit card fraud, and counterfeit check fraud. Based upon analysis of the study sample, the number of identity theft-related depository institution SAR filings submitted during calendar year (CY) 2009 was 123 percent higher than the number reported in CY This compares with an 89 percent increase in the numbers of all depository institution SAR filings made in CY 2004 versus CY Over 86 percent of sample depository institution SAR filings bearing either the identity theft suspicious activity characterization or identity theft-associated keywords in their narratives actually described identity theft. Most of the remainder of the filings described identity fraud or provided insufficient information to confirm identity theft. 7 Credit card fraud was the most frequently co-reported suspicious activity characterization with identity theft, appearing in over 45.5 percent of sample filings. 8 In about 30 percent of these filings reporting the successful takeover of an existing credit card account, and 17 percent reporting the successful unauthorized set up of a new credit card account, the alleged identity thief added his/her name to the account as an authorized user. Several types of loan accounts were reportedly abused in 31 percent of filings. In 56.5 percent of filings specifically reporting student loan fraud, subjects included both their name and the victim s name on the loan application as either the borrower or co-signer The numbers of identity theft-characterized filings increased every year until 2009, when the number of filings fell by 9 percent. See the methodology section for the underlying numbers. Most of the other filings marked as identity theft actually described identity fraud. Identity fraud differs from identity theft in that identity fraud involves the use of fabricated identifiers not tied to any true-named individual. Identity theft involves the use of identifying information unique to the rightful owner without the rightful owner s permission. Each SAR filing may report several different characterizations of suspicious activity. 3
7 Analysis of the sample indicated that filers reporting auto loan fraud facilitated by identity theft were successful in identifying these loans as fraudulent prior to funding in 49.5 percent of filings. Similarly, filers reporting student loan fraud facilitated by identity theft identified the loans as fraudulent prior to funding in 54.5 percent of filings. Nearly 27.5 percent of sample identity theft SAR narratives reported that the identity theft victim knew the suspected thief, who was usually a family member, friend, acquaintance, or an employee working in the victim s home. Computer-assisted identity theft was described in 4 percent of filings. Fraud rings that employ identity theft to further their illicit activities were reported in 3.5 percent of filings overall, with the year-to-year trend line strongly up in every period except Victims reportedly discovered identity theft through review of their own account activity in about 28 percent of filings in the sample. Filers credited routine financial institution account monitoring with uncovering identity theft in nearly another 21 percent of sample filings, and checks of commercial databases at account set-up in 14.5 percent of sample filings. Credit reports, law enforcement investigations, collection agencies, and credit monitoring services were responsible for revealing identity theft in a decreasing percentage of sample filings. 4
8 METHODOLOGY For this study, FinCEN defined identity theft as using identifying information unique to the rightful owner without the rightful owner s permission. Unique identifying information includes financial account numbers, such as those used for depository accounts, investments, loans, credit cards, or online payment accounts; officially-issued federal or state identifying documents; and biometric information. An individual s use of another person s Social Security Number (SSN) or Taxpayer Identification Number (TIN) was considered identity theft regardless of whether the individual knew whether, or to whom, the number was issued. Additionally, impersonation of an actual person without consent was considered identity theft regardless of whether the impersonation occurred in person or through any other medium, electronic or otherwise. FinCEN analysts conducted database research to identify SARs filed between January 1, 2003, and December 30, 2009, in which filers checked the box specifying identity theft as a characterization of suspicious activity. Analysts added a relatively small number of filings to the study population based on additional database searches, to identity SAR forms that lacked the identity theft characterization but contained one or more identity theft-associated key words in their narratives. Findings were based upon the weighted combination of data results from two studies the first analyzing a random sample of filings received between January 1, 2003, and September 30, 2008, and the second analyzing a random sample of filings received between October 1, 2008, and December 31, Weighting was determined based on the percentage of documents in each sample found to actually report identity theft multiplied by the number of filings initially determined to meet study parameters. 5
9 GENERAL STATISTICS CY 2004 was the first full year in which depository institutions were obliged to report identity theft as a separate suspicious activity characterization on SARs. Since January 1, 2004, the number of SAR filings reporting identity theft has increased by 123 percent, from 16,051 in CY 2004 to 35,771 in CY During the same period, the overall incidence of SAR filings increased 89 percent, from 380,975 in CY 2004 to 720,309 CY in CY Graph Graph 1 displays 1 displays the annual the filing annual numbers filing of SAR numbers forms bearing of SAR the forms identity bearing the identity theft suspicious theft suspicious activity characterization. activity characterization GRAPH 1 45,000 50% 40,000 35,000 30,000 43% 30% 28,572 30,952 39,625 28% 36,210 40% 30% 25,000 20,000 15,000 10,000 22,011 15,445 0% 8% 20% 10% 0% 5,000-9% -10% 0-20% Total Filings Percentage Change From Prior Year These The numbers year-on-year were calculated percentage by increases multiplying in identity the number theft-characterized of filings identified filings using were the high specific in methodology the first years by the after percentage identity theft of the became analyzed a separate sample characterization by year found to in actually 2003, describe but fell off identity theft. significantly by The rebound noted in 2008 may have related to heightened filer The awareness identity theft and suspicious attention precipitated activity characterization by the identity first theft appeared flag on reporting the SAR requirements form in Since the that form went did not into bear effect this on characterization November 1, until the The middle absolute of number the year, of FinCEN identity omitted theftcharacterized Graph 1. [edited filings November fell in 2009, 2010] as did the number of all depository institution filings, 2003 data from albeit by less than 2 percent. Based Identity on the sampled Theft SARs, Trends, 373 different Patterns, institutions and Typologies filed reports Reported of identity in theft. As 6 shown in Chart 1, the top Suspicious 10 filers were Activity responsible Reports for just over half the filings.
10 The year-on-year percentage increases in identity theft-characterized filings were high in the first years after identity theft became a separate characterization in 2003, but fell off significantly by The rebound noted in 2008 may have related to heightened filer awareness and attention precipitated by the identity theft red flag reporting requirements that went into effect on November 1, The absolute number of identity theft-characterized filings fell in 2009, as did the number of all depository institution filings, albeit by less than 2 percent. Based on the sampled SARs, 373 different institutions filed reports of identity theft. As shown in Chart 1, the top 10 filers were responsible for just over half the filings. CHART 1 CHART 1 Typologies, Trends, and Patterns Sample filings reported three main types of fraud facilitated by identity theft: credit card fraud, all types of loan fraud, and depository account fraud. As noted in Graph 2 and Graph 3, the data shows a shift away from identity theft to facilitate credit card fraud and toward identity theft to facilitate mortgage loan fraud and all types of consumer loan fraud, especially auto and student loan fraud. 7
11 TYPOLOGIES, TRENDS & PATTERNS Sample filings reported three main types of fraud facilitated by identity theft: credit card fraud, all types of loan fraud, and depository account fraud. As noted in Graph 2 and Graph 3, the data shows a shift away from identity theft to facilitate credit card fraud and toward identity theft to facilitate mortgage loan fraud and all types of consumer loan fraud, especially auto and student loan fraud. GRAPH GRAPH 2 16,000 14,000 12,000 10,000 8,000 6,000 4, % 7,366 All Identity Theft-Characterized Filings Co-Reporting Credit Card Fraud 53.5% 10,458 10, % 11, % 14, % 13, % 70% 60% 50% 40% 30% 20% 2,000 10% All Filings Co Reporting Credit Card Fraud Percentage of Sample Identity Theft Characterized Filings 0% As can be seen in Graph 2, though the absolute number of co-reported credit card filings continued to rise until 2009, the rate of increase did not keep pace with increases in identity theft-characterized filings during most of the period. 8
12 As can be seen in Graph 2, though the absolute number of co-reported credit card filings continued to rise until 2009, the rate of increase did not keep pace with increases in identity theft-characterized filings during most of the period. GRAPH 3 GRAPH 20 Percentage of Sample Identity Theft Filings Co-Reporting Auto, Mortgage, or Consumer Loan Fraud Auto Loan Fraud Mortgage Loan Fraud Non Auto Consumer Loan Fraud Credit Card Fraud Credit Card Fraud Credit card fraud was the most prevalent type of identity theft-facilitated fraud reported Credit during card fraud the study was the period. most prevalent Identity type thieves of identity reportedly theft-facilitated engineered fraud reported takeovers of during the study period. Identity thieves reportedly engineered takeovers of existing existing legitimate legitimate credit credit card accounts card accounts and set up and new set unauthorized up new unauthorized accounts using the accounts using the identifying information of of identity identity theft theft victims. victims. Reports Reports often described often described physical theft physical theft of credit cards from from the the mail mail or from or the from person the or person residence or residence of the victim. of the victim. Cards Cards also were also were reportedly stolen by virtual means through the skimming the skimming of credit of card credit card numbers numbers in the in course the course of of normal commerce; or or through collection collection of this of information this information online as a result of personal computer viral infection or consumer response to phishing online as a result of personal computer viral infection or consumer response to phishing s and spoofed Web sites. 12 In some cases, suspects used stolen credit card numbers s to and create spoofed a usable Web copy sites. of the 12 credit In some card (a cases, cloned suspects card). Individuals used stolen often credit reportedly card numbers used to stolen create credit a usable card numbers copy of without the credit having card physical (a cloned custody card). of the Individuals card in non-pointof-sale used transactions stolen conducted credit card over numbers the Internet, without by phone, having or by physical mail. custody of the card often reportedly in non-point-of-sale transactions conducted over the Internet, by phone, or by mail. Graph 4 displays the percentage of sample filings by year reporting each type of credit card account-related abuse facilitated by identity theft. Credit card fraud was co-reported 12. Skimming in about is 45.5 the process percent by of which the sample the identity SAR filings. thief collects credit card information when the card is presented or the credit card number is provided in any sales transaction. Skimming most frequently refers to the electronic collection of credit card information using an instrument made for this purpose, but may also involve simple manual collection. 12 Skimming is the process by which the identity thief collects credit card information when the card is presented or the credit card number is provided in any sales transaction. Skimming most frequently refers to the electronic collection of credit card information using an instrument made for this purpose, but may Suspicious Activity 7 Reports also involve simple manual collection. 9
13 Graph 4 displays the percentage of sample filings by year reporting each type of credit card account-related abuse facilitated by identity theft. Credit card fraud was co-reported in about 45.5 percent of the sample SAR filings. GRAPH 4 GRAPH 4 Percentage of Sample SAR Filings Reporting Noted Types of Credit Card Account Abuse Facilitated by Identity Theft Successful Unauthorized Account Set up Attempted Unauthorized Account Set up Takeover of Existing Account Graph Graph 4 illustrates 4 illustrates that that the the percentage of sample filings filings reporting reporting credit credit card fraud card as fraud a as a co-reported co-reported suspicious activity characterization characterization with with identity identity theft declined theft between declined 2004 between and 2006 and reached a plateau thereafter and 2006 and reached a plateau thereafter. Attempts to Become Authorized Purchasers Attempts to Become Authorized Purchasers Interestingly, in over 30 percent of sample filings that reported the takeover of an existing Interestingly, in over 30 percent of sample filings that reported the takeover of an legitimate credit card account, the subject reportedly added his/her own name as an existing authorized legitimate user credit of the card. card Likewise, account, in the almost subject 17 percent reportedly of sample added filings his/her reporting own name the as an successful authorized set-up user of one of or the more card. unauthorized Likewise, credit in card almost accounts 17 percent using victim of sample filings identifiers, reporting the the subject successful included set-up his/her of name one as or an more authorized unauthorized purchaser along credit with card the accounts victim. using victim identifiers, the subject included his/her name as an authorized purchaser It would along seem with counterintuitive the victim. that identity thieves would connect their actual names to accounts they abuse for fear of giving away their identity in any ensuing investigation. It would However, seem in counterintuitive 15.5 percent of sample that filings identity in which thieves identity would thieves connect reportedly their added actual names their to accounts names to legitimate they abuse existing for accounts, fear of giving and in 44.5 away percent their of identity sample filings in any in ensuing which investigation. they reportedly However, included in their 15.5 names percent as authorized of sample purchasers filings on in unauthorized which identity new thieves reportedly accounts added set-up their using names victim identifiers, to legitimate the suspected existing thieves accounts, were family and in members, 44.5 percent friends, or, in several cases, employees of the victim. of sample filings in which they reportedly included 13 their names as authorized 13 In practice, many retail establishments make no apparent effort to identify credit card users, relying largely instead on automatic authorization systems in place to alert the sales clerk to flagged or blocked credit card accounts. Many systems in use today also flag cards showing usage patterns inconsistent with prior patterns recorded for the particular account. Though this software can be helpful in identifying accounts that have been taken over without the legitimate account holder s knowledge, they may be of little Suspicious Activity 8 Reports help in identifying new, unauthorized accounts. 10
14 purchasers on unauthorized new accounts set-up using victim identifiers, the suspected thieves were family members, friends, or, in several cases, employees of the victim. 13 Individuals not known to the victims who reportedly added names to legitimate accounts apparently did so for ease of use. However, the names added were often fraudulent or were names of other true-named persons for whom the thieves possessed credible identification. Private Label Cards Of the sample filings that described attempted or successful unauthorized credit card account set-up, nearly 11.5 percent reported private label ( store ) card account set-ups. 14 All but a few of these filings (97 percent) reported the account set-up as successful. 15 This compares with an overall successful set-up rate estimated from the sample of about 88 percent. The significantly higher success rate in setting up unauthorized private label card accounts may relate to the instant credit offered by many retailers that issue private label cards. Issuers not only allow but often incentivize the use of these cards beginning on the day the application is completed at the issuing retail establishment. Accounts Opened under Business Names In about 8 percent of sample filings, the reported identity thief set up unauthorized new accounts in the name of a business, listing a principal of the business as the payment guarantor. 13. In practice, many retail establishments make no apparent effort to identify credit card users, relying largely instead on automatic authorization systems in place to alert the sales clerk to flagged or blocked credit card accounts. Many systems in use today also flag cards showing usage patterns inconsistent with prior patterns recorded for the particular account. Though this software can be helpful in identifying accounts that have been taken over without the legitimate account holder s knowledge, they may be of little help in identifying new, unauthorized accounts. 14. Private label cards are store cards issued bearing the name of a retailer. Many are processed through one of the major card networks (mainly Visa or MasterCard) and bear that logo as well. Others are issued and processed completely in-store. All private label cards share certain characteristics, including that they may only be used at the issuing business and do not allow balance transfers or cash withdrawals. See A successful setup is defined as one in which the card is issued to the identity thief and used to secure merchandise. 11
15 Loan Fraud About 31 percent of sample SAR filings reported successful and unsuccessful attempts at loan fraud, including fraud related to loans for automobiles, mortgages, student loans, and other types of consumer loans. Auto Loan Fraud The percentage of sample SAR filings reporting attempts to use identity theft to facilitate auto loan fraud was about twice as high as for other type of loans until As Graph 5 shows, reporting on auto loan fraud facilitated by identity theft increased rapidly from as a percentage of all sample identity theft filings, then increased at a much slower rate through 2008, and fell in About 10.5 percent of the identity theft-associated sample SARs filed in 2009 reported successful or attempted auto loan fraud. GRAPH 5 Percentage of Sample SAR Filings Reporting Successful & Attempted Auto Loan Fraud Facilitated by Identity Theft Successful Auto Loan Fraud Attempted Auto Loan Fraud The data The suggest data suggest that that filers filers making auto loans have have had had significant significant success success in identifying in identifying such fraudulent such fraudulent loans before loans they before are funded. they Overall, are funded. slightly Overall, less than 50 slightly percent less of the than fraudulent auto loans reported in the sample data were detected prior to funding. 50 percent of the fraudulent auto loans reported in the sample data were detected prior to Mortgage funding. Loan Fraud As shown in Graph 6, filing trends indicate that identity theft-facilitated mortgage loan fraud reporting was up through 2008, but fell in The sample data show a downward reporting trend in the percentage of such loans identified prior to funding. This trend may result from increased filer scrutiny and awareness of the factors contributing to foreclosure rather than to an actual increase in successful identity theftassociated mortgage loan fraud. Data from a recent mortgage loan fraud quarterly update indicates that the majority of mortgage loan fraud-associated SAR filings submitted 12 recently reference mortgages granted more than 2 years prior to the SAR submission date. 16
16 Mortgage Loan Fraud As shown in Graph 6, filing trends indicate that identity theft-facilitated mortgage loan fraud reporting was up through 2008, but fell in The sample data show a downward reporting trend in the percentage of such loans identified prior to funding. This trend may result from increased filer scrutiny and awareness of the factors contributing to foreclosure rather than to an actual increase in successful identity theft-associated mortgage loan fraud. Data from a recent mortgage loan fraud quarterly update indicates that the majority of mortgage loan fraud-associated SAR filings submitted recently reference mortgages granted more than 2 years prior to the SAR submission date GRAPH GRAPH 6 Percentage of Sample SAR Filings Reporting Successful & Attempted Mortgage Loan Fraud Facilitated by Identity Theft Attempted Mortgage Loan Fraud Successful Mortgage Loan Fraud Through 2008, only 0.35 percent of sample filings reported the successful takeover of home Through equity 2008, line only of credit 0.35 percent accounts of sample (HELOCs). filings reported Conversely, the successful nearly takeover 2 percent of of home equity line of credit accounts (HELOCs). Conversely, nearly 2 percent of sample sample identity identity theft-associated theft-associated filings referenced filings referenced the abuse or the attempted abuse abuse or attempted of abuse of HELOCs. Consumer Loan Fraud Beginning in 2006, student loan fraud accounted for the largest plurality of identity theft facilitated non-auto consumer loan fraud sample reports, representing 46.5 percent of all such sample filings during the study periods. The consumer loan fraud 16. See sample data indicate an overall shift away from auto and mortgage loan fraud, toward student loan fraud. The success rate noted in the sample in identifying such loans prior to funding has varied year-by-year. Overall, 54.5 percent of fraudulent student loans reported in the sample were detected prior to funding. 13 In over 56.5 percent of the sample filings reporting attempted or successful student loan fraud, the alleged identity Suspicious thief listed both Activity the victim Reports and himself/herself on the loan as recipient or co-signer. Graph 7 displays sample data from filings that reported consumer loan fraud not related to mortgage or auto loans.
17 Consumer Loan Fraud Beginning in 2006, student loan fraud accounted for the largest plurality of identity theft facilitated non-auto consumer loan fraud sample reports, representing 46.5 percent of all such sample filings during the study periods. The consumer loan fraud sample data indicate an overall shift away from auto and mortgage loan fraud, toward student loan fraud. The success rate noted in the sample in identifying such loans prior to funding has varied year-by-year. Overall, 54.5 percent of fraudulent student loans reported in the sample were detected prior to funding. In over 56.5 percent of the sample filings reporting attempted or successful student loan fraud, the alleged identity thief listed both the victim and himself/herself on the loan as recipient or co-signer. Graph 7 displays sample data from filings that reported consumer loan fraud not related to mortgage or auto loans. GRAPH 7 GRAPH 7 Percentage of Sample SAR Filings Reporting Successful & Attempted Consumer Loan Fraud Facilitated by Identity Theft Successful Consumer Loan Fraud Attempted Consumer Loan Fraud Depository Account Fraud Though not a characterization of suspicious activity appearing on SAR forms, analysis of the SAR sample noted a significant amount of abuse associated with depository accounts facilitated by identity theft as displayed in Graph GRAPH 8 14
18 Depository Account Fraud Though not a characterization of suspicious activity appearing on SAR forms, analysis of the SAR sample noted a significant amount of abuse associated with depository accounts facilitated by identity theft as displayed in Graph GRAPH 8 Though Though no trends no trends are are evident in the sample data data by specific by specific type of type activity, of activity, the overall the trend in reporting of depository account abuse facilitated by identity theft, measured as a overall trend in reporting of depository account abuse facilitated by identity theft, percentage of total sample filings, was mildly down over the course of the study, but measured showed as a rebound percentage in of total sample filings, was mildly down over the course of the study, but showed a rebound in Akin to an identity thief who adds his/her name to an existing or new unauthorized credit Akin to or loan identity account, thief a frequently who adds reported his/her means name of facilitation to an existing associated or with new depository unauthorized credit accounts or loan involves account, the a identity frequently thief who reported opens a means new joint of facilitation account in the associated name of the with depository victim accounts and him/herself. involves The the identity identity thief then thief poses who as opens the victim a new and directs joint account that funds in the be transferred from one or more legitimate existing victim accounts into the new joint name account, of the victim thus making and him/herself. these funds available The identity to the identity thief thief. then poses as the victim and directs that funds be transferred from one or more legitimate existing victim accounts into the Application new joint of account, the percentages thus reported making in these Graph funds 8 to the available total number to the of identity theft thief. filings reported in Graph 1 yields Graph Results are not stacked because a significant number of SAR narratives report both attempted and successful new account setups and/or account takeovers within the same SAR document. [edited November 9, 2010] 15
19 Application of the percentages reported in Graph 8 to the total number of identity theft filings reported in Graph 1 yields Graph 9. GRAPH 9 7,000 6,000 5,000 4,000 3,000 2,000 1,000 0 Estimated Annual Filings Extrapolated from Sample Analysis Successful Unauthorized Account Set up Takeover of Existing Account(s) Attempted Unauthorized Account Set up Graph Graph 9 indicates 9 indicates that that in in terms terms of of depository depository account account abuse abuse associated associated with identity with identity theft, theft, filers filers most most frequently frequently reported reported the successful the set successful up of one or set more up of unauthorized one more unauthorized account(s) account(s) using victim using identifiers victim (prevalently identifiers reported (prevalently in reported and 2009); in and followed 2009); by followed the takeover by of the one takeover or more existing of one victim or more account(s) existing (prevalently victim account(s) reported in 2004 and 2008). (prevalently reported 18 in 2004 and 2008). 18 Prepaid Cards and Probable Tax Refund Fraud Prepaid Cards and Probable Tax Refund Fraud Overall, filers referenced prepaid cards in about one percent of the sample filings, Overall, submitted filers referenced almost exclusively prepaid in 2008 cards and in about In one all instances, percent filers of the reported sample the filings, set-up of multiple prepaid card accounts in different names using valid SSNs for each of the submitted supplied almost names. exclusively The filers sent in 2008 multiple and cards in different In all instances, names to the filers same reported address. the set-up Filers of multiple confirmed prepaid through card commercial accounts database in different searches that names the mail-to using addresses valid SSNs did not for each of correspond the supplied with reported names. addresses The filers for any sent of multiple the relevant cards cardholders. in different Shortly names after card to the same activation, address. the filers Filers received confirmed one or more through ACH commercial credit(s) from database the U.S. Treasury searches or from that a state revenue office representing a tax refund for the benefit of the cardholder. the mail-to addresses did not correspond with reported addresses for any 19 Filers of the noted that the presumed identity thieves quickly drained card balances, mainly through relevant ATM cardholders. cash withdrawals, Shortly but sometimes after card also activation, through point-of-sale the filers received (POS) merchandise one or more ACH credit(s) purchases. from When the a filer s U.S. anti-money Treasury or laundering from a software state revenue flagged office such cards representing for a abnormal activity on cards receiving loads above pre-determined levels, the filer reportedly blocked the card. Filer attempts to have the cardholder verify his/her identity 18. Numbers were fruitless. 20 were derived by multiplying the annual percentages reported in Graph 8 by the corresponding annual numbers reported in Graph Numbers were derived by multiplying the annual percentages reported in Graph 8 by the corresponding annual numbers reported in Graph These refunds were presumably the result of fraudulently submitted tax filings made using the valid names and identifying numbers of identity theft victims. 20 The prepaid cards used were invariably reloadable open-loop cards that allowed loads of at least $5, One of the most frequently reported cards employed was specifically issued to receive tax refunds. 14
20 tax refund for the benefit of the cardholder. 19 Filers noted that the presumed identity thieves quickly drained card balances, mainly through ATM cash withdrawals, but sometimes also through point-of-sale (POS) merchandise purchases. When a filer s anti-money laundering software flagged such cards for abnormal activity on cards receiving loads above pre-determined levels, the filer reportedly blocked the card. Filer attempts to have the cardholder verify his/her identity were fruitless. 20 Fraud and Identity Theft Rings Somewhat less than 3.5 percent of sample filings reported the operation of known identity theft and/or fraud rings. Just over half reported that the filer had notified local, state, or federal law enforcement about these rings. Table 1 shows the results of a search of all SARs reporting an identity theft characterization received between 2004 and 2009 that referenced a ring or conspiracy in the narrative section. Year All SAR Filings Bearing an Identity Theft Characterization TABLE 1 All Identity Theft Filings with Ring or Conspiracy in Narrative Percentage Year-on- Year Percent Change , % 0% , % 71% , % -10% ,952 1, % 17% ,625 1, % 17% ,210 2, % 56% TOTAL 172,815 6, % As can be seen in Table 1, the proportional reporting trend for filings reporting both identity theft and the involvement of rings or conspiracies is steeply up, with the percentage of such filings increasing year-to-year in every period except These refunds were presumably the result of fraudulently submitted tax filings made using the valid names and identifying numbers of identity theft victims. 20. The prepaid cards used were invariably reloadable open-loop cards that allowed loads of at least $5,000. One of the most frequently reported cards employed was specifically issued to receive tax refunds. 17
21 Abuse of Employee and Customer Database Information Twelve sample filings reported breaches of employee or customer databases. 21 Filers reported that in four of these filings, a current or former employee was determined responsible for intentional breaches in order to sell identifying information to identity thieves. In 16 sample reports, filers said their own employees used customer information to defraud the filer. Another 10 sample filings reported employees setting up unauthorized accounts using customer identifiers so that the employee could meet sales or incentive goals. Filers reported mortgage loan professionals in six sample filings, auto dealership employees in three, and tax preparers in two. These individuals apparently abused customer-supplied identifiers to set up unauthorized credit, loan, or depository accounts. Geographical Data Most of the subjects named in the total population of 2009 identity theft-characterized SARs lived in states with the largest populations. Table 2 lists the 2009 top 10 states in terms of distinct identity theft SAR subjects per state by zip code. Minnesota (7 th ), which ranks 21 st by population, is a notable exception. TABLE 2 Rank State 2009 SAR Identity Theft Subjects by Subject Residence Zip Code 1 California 5,366 2 Florida 2,582 3 Texas 2,022 4 New York 1,931 5 Illinois 1,551 6 Georgia 1,402 7 Minnesota 1,031 8 Washington 1,005 9 Michigan Pennsylvania For purposes of the study, breach was narrowly defined to mean the compromise of sensitive customer/employee identifying information to individuals outside the company/organization legitimately retaining the data. Employee abuse of such data not involving compromise of the data to outside individuals was not considered a breach. 18
22 However, when the data is viewed proportionally, based on 2009 SAR identity theft subjects per 100,000 state residents, disproportionately high numbers of subjects surface in Minnesota (1 st ), Nevada (2 nd ), Utah (4 th ), Wisconsin (8 th ), and Kansas (9th), as noted in Map 1. The map shows the proportional incidence of identity theft subjects by subject residence zip code reported in all SAR filings received during the CY 2009, bearing an identity theft suspicious activity characterization. 22 MAP 1 AK Identity Theft SAR Subjects per 100,000 State Residents HI 9.39 WA OR NV CA ID 6.96 UT AZ 8.63 MT 3.10 WY 6.57 CO 7.28 NM 5.34 ND 2.96 MN SD 3.73 NE 5.83 KS IA 3.33 MO OK AR LA TX WI IL MS 7.72 MI ME 3.72 NY MA PA RI OH IN WV DE NJ CT KY VA MD TN NC DC SC 8.15 AL GA VT NH 2009 Identity Theft SAR Subjects per 100,000 State Residents 12.2 to 20 (8) 8.7 to (11) 6.8 to 8.69 (10) 5.3 to 6.79 (11) 0 to 5.29 (12) PAGE 10 Fourteen Fourteen states states exceeded exceeded the the average average of of subjects subjects per per 100, ,000 state state residents. residents. The The median median was was subjects subjects per per 100,000 state residents. Analysis Analysis using using the the same same subject-based parameters employed employed to produce to produce the map the showed map showed credit credit card card fraud fraud as the predominant as the predominant co-reported co-reported characterization characterization in most states during most all states reporting during all periods. reporting However, periods. several However, states showed several notable states variation. showed For example, notable variation. Graph 10 shows that a plurality of SAR-reported Wisconsin identity theft subjects were For example, Graph 10 shows that a plurality of SAR-reported Wisconsin identity associated with mortgage loan fraud until 2009, when a plurality was instead reported to theft subjects be associated were with associated consumer with loan fraud. mortgage loan fraud until 2009, when a plurality was instead reported to be associated with consumer loan fraud. FL PR Numbers represent the proportional incidence of subjects reported per 100,000 state residents for CY 2009, in SARs bearing an identity theft suspicious activity characterization. Same subjects duplicated in the same zip code were deleted. Same subjects reported in multiple zip codes were retained. Though this methodology inflates the actual number of distinct subjects tied to multiple addresses in differing zip codes, it also provides a clearer indication of likely physical locations of identity theft perpetration. Research identified 30,268 distinct identity theft SAR subjects based on their reported residential zip codes. Research identified another 431 subjects that could be tied to a state, but not to a specific zip code. Both of these groups were included in the data to support Map 1. Another 3,596 reported subjects could not be tied to a specific state of residence. Data for these subjects was omitted from Map 1. Of these omitted subjects, 250 were tied to foreign residences. 19
23 GRAPH 10 GRAPH WISCONSIN - Suspicious Characterization Co-Reporting 60% WISCONSIN - Suspicious Characterization Co-Reporting 50% 60% 50% 40% 40% 30% 30% 20% 20% 10% 10% 0% 0% Consumer 2005Loan Fraud Credit 2008 Card Fraud2009 Mortgage Consumer Loan Fraud Credit Card Fraud Mortgage Loan Fraud Graph 11 displays the absolute numbers of unique Wisconsin subjects reported by year Graph associated Graph 11 displays 11 displays with the identity the absolute absolute theft overall numbers numbers and with of of unique unique the specified Wisconsin Wisconsin co-reported subjects subjects reported suspicious reported by year by year activity associated characterizations. with with identity identity theft Notice overall theft that and overall although with the and the specified highest with the co-reporting co-reported specified suspicious percentage co-reported for suspicious activity mortgage activity characterizations. loan fraud characterizations. occurred Notice in 2006, that although Notice the greatest that the number highest although of co-reporting unique the highest mortgage percentage co-reporting loan for fraud subjects was reported in 2007, as the overall number of identity theft subjects increased percentage mortgage for loan mortgage fraud occurred loan fraud in 2006, occurred the greatest in 2006, number the of unique greatest mortgage number loan of fraud unique markedly subjects was over reported in 2007, as the overall number of identity theft subjects increased mortgage markedly loan over fraud subjects was reported in 2007, as the overall number of identity theft subjects increased markedly over GRAPH GRAPH 11 WISCONSIN - Unique Subjects GRAPH 11 by Residential Zip Code WISCONSIN - Unique Subjects by Residential Zip Code 1,200 1,000 1,200 1, Consumer Loan Fraud Credit Card Fraud Mortgage Consumer Loan Fraud Identity Credit Card Theft Fraud Mortgage Loan Fraud Identity Theft
24 In Minnesota In Minnesota (Graph (Graph 12), 12), by by CY CY the number of of identity theft theft subjects subjects reportedly reportedly engaged engaged in in mortgage loan fraud surpassed the the number number engaged engaged in credit in card credit fraud. card fraud. Mortgage Mortgage loan loan fraud fraud was was a a co-reported characterization with associated consumer-loan with fraud over and 80 mortgage-loan fraud, associated with over 80 percent of identity theft subjects with a percent of identity theft subjects with a Minnesota address by 2008, before declining Minnesota address by 2008, before declining to 63 percent in to 63 percent in [edited November 9, 2010] GRAPH GRAPH % 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% MINNESOTA - Suspicious Characterization Co-Reporting Consumer Loan Fraud Credit Card Fraud Mortgage Loan Fraud Graph Graph 13 highlights 13 highlights the the dramatic surge in in 2008 of of Minnesota identity identity theft subjects theft subjects reportedly reportedly engaged almost exclusively in in mortgage loan loan fraud fraud and the and subsequent the subsequent decline decline reported reported in in GRAPH 13 GRAPH 13 MINNESOTA - Unique Subjects by Residential Zip Code 3,500 3,000 2,500 2,000 1,500 1, Consumer Loan Fraud Credit Card Fraud Mortgage Loan Fraud 19 Identity Theft In Indiana Identity (Graph Theft 14), the Trends, number Patterns, of identity and theft Typologies subjects thought Reported to be in involved in 21 mortgage loan fraud increased substantially after 2007, crossing a plummeting credit card fraud trend line in GRAPH 14
25 Consumer Loan Fraud Credit Card Fraud Mortgage Financial Loan Crimes Fraud Enforcement Identity Network Theft In Indiana Indiana (Graph (Graph 14), 14), the the number of identity theft subjects thought thought to be involved to be involved in mortgage mortgage loan loan fraud fraud increased substantially after after 2007, 2007, crossing crossing a plummeting a plummeting credit card credit fraud trend line in card fraud trend line in GRAPH 14 GRAPH 14 60% 50% 40% 30% 20% 10% 0% INDIANA - Suspicious Characterization Co-Reporting Consumer Loan Fraud Mortgage Loan Fraud Credit Card Fraud Graph Graph 15 indicates 15 the total the number total number of unique of Indiana unique identity Indiana theft identity subjects increased theft subjects rapidly increased beginning rapidly in 2004, beginning doubled in in 2004, 2008 from doubled its 2007 in level 2008 (851 from versus its ), level before (851 settling versus back to 628 in ), before settling back to 628 in GRAPH GRAPH ,000 INDIANA - Unique Subjects by Residential Zip Code Consumer Loan Fraud Credit Card Fraud Mortgage Loan Fraud Identity Theft Washington (Graph 16), Utah (Graph 18), and Oregon (Graph 20) show similarly dramatic Identity trend lines Theft evidencing Trends, the Patterns, predominance and of Typologies identity theft Reported subjects in reportedly 22 engaged in consumer loan Suspicious fraud. Activity Reports GRAPH 16
26 30% Consumer Loan Fraud Credit Card Fraud Mortgage Loan Fraud Identity Theft Financial Crimes Enforcement Network Washington Washington (Graph (Graph 16), 16), Utah Utah (Graph 18), and Oregon (Graph (Graph 20) 20) show show similarly similarly dramatic trend lines evidencing the predominance of identity theft subjects reportedly dramatic trend lines evidencing the predominance of identity theft subjects reportedly engaged in consumer loan fraud. engaged in consumer loan fraud. GRAPH 16 GRAPH 16 60% 50% 40% 30% 20% 10% 0% WASHINGTON - Suspicious Characterization Co-Reporting Consumer Loan Fraud Credit Card Fraud Mortgage Loan Fraud 1,200 1, GRAPH 17 GRAPH WASHINGTON - Unique Subjects by Residential Zip Code Consumer Loan Fraud Mortgage Loan Fraud Credit Card Fraud Identity Theft The number of Utah (Graph 18) identity theft subjects engaged in consumer loan fraud outstripped those engaged in credit card fraud by GRAPH 18 UTAH - Suspicious Characterization Co-Reporting 50% 40% 23
27 Consumer Loan Fraud Credit Card Fraud Mortgage Financial Loan Fraud Crimes Enforcement Identity Network Theft The number The number of Utah of Utah (Graph (Graph 18) 18) identity theft subjects engaged engaged in consumer in consumer loan fraud loan outstripped those engaged in credit card fraud by fraud outstripped those engaged in credit card fraud by GRAPH GRAPH % UTAH - Suspicious Characterization Co-Reporting 40% 30% 20% 10% 0% Consumer Loan Fraud Mortgage Loan Fraud Credit Card Fraud Note in Graph 19 the persistent increase in the number of Utah identity theft subjects Note in Graph 19 the persistent increase in the number of Utah identity theft subjects involved in consumer loan fraud. Interestingly, the increase does not appear to be involved strongly in consumer tied to the overall loan fraud. number Interestingly, of identity theft subjects, the increase can does be seen not in appear the 2007 to be strongly figures. tied to the overall number of identity theft subjects, as can be seen in the 2007 figures. 22 GRAPH 19 GRAPH UTAH - Unique Subjects by Residential Zip Code Consumer Loan Fraud Credit Card Fraud Mortgage Loan Fraud Identity Theft Oregon identity theft subjects (Graph 20) showed the earliest and most sustained penchant for involvement in consumer loan fraud, beginning in GRAPH OREGON - Suspicious Activity Co-Reporting
28 Consumer Loan Fraud Credit Card Fraud Mortgage Financial Loan Fraud Crimes Enforcement Identity Network Theft Oregon Oregon identity identity theft theft subjects subjects (Graph (Graph 20) 20) showed showed the the earliest earliest and most and sustained most sustained penchant for involvement in consumer loan fraud, beginning in penchant for involvement in consumer loan fraud, beginning in GRAPH 20 GRAPH 20 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% OREGON - Suspicious Activity Co-Reporting Consumer Loan Fraud Credit Card Fraud Mortgage Loan Fraud Graph 21 recounts the steady increase in Oregon identity theft subjects reportedly Graph associated 21 recounts with consumer the steady loan increase fraud. in Oregon identity theft subjects reportedly associated with consumer loan fraud. GRAPH 21 GRAPH OREGON - Unique Subjects by Residential Zip Code Consumer Loan Fraud Mortgage Loan Fraud Credit Card Fraud Identity Theft Nationally (Graph 22), SARs continue to report a plurality of identity theft subjects committing credit card fraud, though the trend line is consistently and moderately downwards. The trend line representing identity theft subjects involved in mortgage loan fraud was significantly up until a large decline in The overall trend line in numbers Identity of identity Theft theft subjects Trends, associated Patterns, with and consumer Typologies loan Reported fraud has in been modestly 25 but consistently up.
29 Nationally (Graph 22), SARs continue to report a plurality of identity theft subjects committing credit card fraud, though the trend line is consistently and moderately downwards. The trend line representing identity theft subjects involved in mortgage loan fraud was significantly up until a large decline in The overall trend line in numbers of identity theft subjects associated with consumer loan fraud has been modestly but consistently up. GRAPH NATIONAL - Suspicious Characterization Co-Reporting 50% 45% 40% 35% 30% 25% 20% 15% 10% 5% 0% Consumer Loan Fraud Credit Card Fraud Mortgage Loan Fraud A comparison of the overall numbers of unique identity theft subjects reported in Graph 23 with the overall numbers of identity theft filings reported in Graph 1 will demonstrate that the number of identity theft filings made from 2004 through 2009 exceeded the number of unique identity theft subject names reported during this period. In fact, of the 172,815 SAR filings characterized as identity theft during the period, 49,715 (nearly 29 percent) reported no subject names at all. 23. Although overall trend lines appearing in Graph 22 generally show the same general patterns as those noted in Graphs 2 and 3, percentages are significantly different. The data supporting Graphs 2 and 3 were derived from an analysis of sample filings. All sample filings were accorded equal weight regardless of the number of identified subjects per filing, to include filings identifying no subjects. Conversely, data supporting Graph 22 are subject-based, and were derived from a statistical summarization of all filings reporting an identity theft characterization. Filings were proportionally weighted based upon the number of reported subjects, delimited by the same parameters used for Map 1 (see footnote 22). Consequently, filings reporting no subjects were not included in the data supporting Graph Although overall trend lines appearing in Graph 22 generally show the same general patterns as those noted in Identity Graphs 2 and Theft 3, percentages Trends, are significantly Patterns, different. and Typologies The data supporting Reported Graphs in 2 and 3 were 26 derived from an analysis of sample filings. All sample filings were accorded equal weight regardless of the number of identified subjects per Suspicious filing, to include Activity filings Reports identifying no subjects. Conversely, data supporting Graph 22 are subject-based, and were derived from a statistical summarization of all filings reporting an identity theft characterization. Filings were proportionally weighted based upon the number of reported subjects, delimited by the same parameters used for Map 1 (see footnote 22). Consequently,
30 24 The number of 2009 unique subjects in this graph is about 3 percent less than that for Map 1. The data used for Map 1 were extensively cleaned while the data for Graph 22 were drawn directly from a statistical Financial Crimes Enforcement Network A comparison of the overall numbers of unique identity theft subjects reported in Graph 23 with the overall numbers of identity theft filings reported in Graph 1 will demonstrate that the number of identity theft filings made from 2004 through 2009 exceeded the number of unique identity theft subject names reported during this period. In fact, of the 172,815 SAR filings characterized as identity theft during the period, 49,715 (nearly 29 percent) reported no subject names at all. GRAPH GRAPH ,000 30,000 25,000 20,000 15,000 10,000 5,000 0 NATIONAL - Unique Subjects by Residential Zip Code 31,921 29,172 22,907 20,868 15,709 10, Consumer Loan Fraud Credit Card Fraud Mortgage Loan Fraud Identity Theft Means of Theft Discovery Over 27.5 percent of sample filings reported that identity theft was discovered when customers contacted the filer to question transactions on existing accounts or to contest ownership of recently established accounts, or when customers confirmed identity theft after filers contacted them to question anomalous account transactions. Filers credited their normal account monitoring with uncovering identity theft in nearly 21 percent of sample filings. Searches of commercial databases contributed to discovery of identity theft in 14.5 percent of sample filings, while filer or customer review of customer credit reports was noted as contributing to discovery in 10.5 percent. A federal, state, or local law enforcement agency reportedly brought identity theft to the attention of financial institutions in 5 percent of sample filings. An unexpected call from a bill collector alerted victims to identity theft in 2.5 percent of sample filings. Credit monitoring services or receipt of an unexpected bill were each responsible for uncovering identity theft in less than 2 percent of sample filings. Methods of Theft Facilitation 24. The number of 2009 unique subjects in this graph is about 3 percent less than that for Map 1. The data used for Map 1 were extensively cleaned while the data for Graph 22 were drawn directly from a The most commonly reported means of identity theft facilitation were actions by friends statistical summarization, thus explaining the difference. and family members of the victim. At least 22 percent of sample filings reported mainly family members of the victim, but also friends, as likely complicit in the reported identity theft. The close relationship presumably gave the subject access to the victim s personal information. Also included in this group, though less frequently reported, were others given Identity physical access Theft to the Trends, victim s Patterns, residence, and such Typologies as caregivers Reported or repair in persons. 27
31 Means of Theft Discovery Over 27.5 percent of sample filings reported that identity theft was discovered when customers contacted the filer to question transactions on existing accounts or to contest ownership of recently established accounts, or when customers confirmed identity theft after filers contacted them to question anomalous account transactions. Filers credited their normal account monitoring with uncovering identity theft in nearly 21 percent of sample filings. Searches of commercial databases contributed to discovery of identity theft in 14.5 percent of sample filings, while filer or customer review of customer credit reports was noted as contributing to discovery in 10.5 percent. A federal, state, or local law enforcement agency reportedly brought identity theft to the attention of financial institutions in 5 percent of sample filings. An unexpected call from a bill collector alerted victims to identity theft in 2.5 percent of sample filings. Credit monitoring services or receipt of an unexpected bill were each responsible for uncovering identity theft in less than 2 percent of sample filings. Methods of Theft Facilitation The most commonly reported means of identity theft facilitation were actions by friends and family members of the victim. At least 22 percent of sample filings reported mainly family members of the victim, but also friends, as likely complicit in the reported identity theft. The close relationship presumably gave the subject access to the victim s personal information. Also included in this group, though less frequently reported, were others given physical access to the victim s residence, such as caregivers or repair persons. Overall, 27 percent of sample filings reported that the victim knew the person(s) believed to be responsible for the identity theft. Submission of a fraudulent change of address was a reported means of identity theft facilitation in 4.5 percent of sample filings, as was theft perpetrated by a business insider with access to employee or customer personal information. Spoofing, phishing, and computer hacking were together credited as facilitators in less than 3.5 percent of sample filings. The victim s status as deceased was reported as a facilitator of identity theft in 3 percent of the sample filings. Most of the remaining sample filings reported that the victim had no idea how the identity theft was facilitated. Several sample filings described the identity thief s use of telephone relay systems intended for use by the deaf to initiate unauthorized banking transactions. The thief may have used this method of communication to avoid the production of a voice print that the bank could create from the tapes it makes of conventional telephone transactions. Several other sample filings described probable money laundering activity in which presumed identity thieves conducted a series of card-to-card transfers using prepaid access cards. 28
32 Timing of Discovery, Victim Harm, Abused Accounts, and Mitigation Timing of Discovery Graph 24 shows the percentage distribution of time elapsed between last known suspicious activity and discovery of identity theft for sample SAR filings. GRAPH GRAPH Percentage Distribution of Sample SAR Filings Based on Time Elapsed Between Last Identified Suspicious Activity and Discovery Same Day 2 6 Days 1 4 Weeks 1 3 Months 3 6 Months 6 12 Months Over 1 Year Much of the activity not discovered for an extended period of time involved identity theft perpetrated Much of the activity for the not purpose discovered of for using an extended the rightful period owner s of time involved credit history identity theft rather than to perpetrated defraud for the the victim purpose or of a using financial the rightful institution. owner s Two credit groups history rather appeared than to to be defraud the victim or a financial institution. Two groups appeared to be motivated to motivated commit to identity commit theft identity for this theft reason. for The this first reason. included The family first members, included friends, family or members, friends, acquaintances or acquaintances of victims of who victims had either who died had or either become died mentally or become incapacitated. mentally The incapacitated. second group The included second individuals group included unknown individuals to the victim. unknown It is possible to that the some victim. of It is possible these individuals that some could of these not establish individuals credit could or depository not establish accounts on credit their or own depository either because of bad credit histories or because of their undocumented status. The accounts on their own either because of bad credit histories or because of their unauthorized use of credit, loan, or depository accounts continued for an extended period undocumented because the status. unauthorized The users unauthorized continued to use make of regular credit, payments loan, or on depository credit or loan accounts continued accounts, for or an to extended use depository period accounts, because in a the non-suspicious unauthorized manner. users continued to make regular payments on credit or loan accounts, or to use depository accounts, in a nonsuspicious Victim Harm manner. FinCEN used FTC parameters to measure victim harm. Harm was rated as low for victims solely suffering abuse of their existing credit card account(s), moderate for victims suffering abuse of other existing financial accounts, and high for victims whose identifiers were abused to create new, unauthorized financial accounts of any type. 25 Victim harm, whether successful or attempted, was assessed as low in 10 percent of sample filings, as moderate in 11 percent of sample filings, and as high in 77 percent 25 These are the same standards of victim harm that the FTC used in its November 2007 study Federal Trade Commission Identity Theft Survey Report, November Synovate. Only the highest level of victim harm reported was recorded for each filing. 29
33 Victim Harm FinCEN used FTC parameters to measure victim harm. Harm was rated as low for victims solely suffering abuse of their existing credit card account(s), moderate for victims suffering abuse of other existing financial accounts, and high for victims whose identifiers were abused to create new, unauthorized financial accounts of any type. 25 Victim harm, whether successful or attempted, was assessed as low in 10 percent of sample filings, as moderate in 11 percent of sample filings, and as high in 77 percent of sample filings. However, since 16 percent of sample filings reported unsuccessful attempts to set up unauthorized accounts, actual victim harm was lower at each level. Abused Accounts Identity thieves reportedly abused credit card accounts in 45.5 percent of sample filings, loan accounts in 31 percent of sample filings, and depository accounts in 25.5 percent. About 1 percent of sample filings reported the abuse of prepaid cards. Two sample filings reported abuse of auto lease arrangements. Single sample filings reported abuse of an investment account and an Internet payment account. Mitigation The most frequently reported actions taken to mitigate successful or attempted illicit activity facilitated by identity theft were account closure (22.5 percent), a filer decision not to complete an account opening or other transaction (19.5 percent), victim filing of an affidavit of forgery (11.5 percent), arrest of the alleged identity thief (5 percent), and shut down of a phishing Web site (1 percent). These are the same standards of victim harm that the FTC used in its November 2007 study, 25. Federal Trade Commission Identity Theft Survey Report, prepared by Synovate. microsites/idtheft/. Only the highest level of victim harm reported was recorded for each filing. 30
34 Red Flags 26 Using the language in the Identity Theft Red Flag Reporting Rules jointly published by the U.S. Treasury, FTC, and federal banking agencies, the two most common red flags reported in sample SAR filings were: The financial institution or creditor is notified by a customer, victim of identity theft, a law enforcement authority, or any other person that it has opened a fraudulent account for a person engaged in identity theft (nearly 75 percent of relevant sample filings), 27 and The financial institution or creditor is notified of unauthorized charges or transactions in connection with a customer s covered account (almost 23 percent of relevant sample filings.) 28 Other red flags reported included: Social Security number provided on application is assigned to individual other than the applicant (8 percent of sample filings), 29 The Social Security number has not been issued, or is listed on the Social Security Administration s Death Master File (6 percent of sample filings), 30 Shortly following the notice of change of address for a covered account, the institution or creditor receives a request for a new, additional, or replacement card or a cell phone, or for the addition of authorized users on the account (4 percent of sample filings), 31 and The customer fails to make the first payment or makes an initial payment but no subsequent payments (4 percent of sample filings) Many filings reported multiple red flags. 27. Red flag 26 enumerated in 16 CFR Part 681 Supplement A to Appendix A. 28. Red flag 25 enumerated in 16 CFR Part 681 Supplement A to Appendix A. 29. Red flag derived by analysts during this study. 30. Red flag 10b enumerated in 16 CFR Part 681 Supplement A to Appendix A. 31. Red flag 19 enumerated in 16 CFR Part 681 Supplement A to Appendix A. 32. Red flag 20b enumerated in 16 CFR Part 681 Supplement A to Appendix A. 31
35 Filings of Special Note Individual filings in the sample describe activities that may reveal specific typologies associated with identity theft and the crimes it facilitates. A bank reported that an individual opened credit card accounts in the names of individuals with the same name as the alleged identity thief. The identifying information was reportedly provided by an associate of the subject who had access to an employer s loan customer database. A bank reported that a person employed as the bookkeeper for a business customer opened an unauthorized business credit card in the name of the business, listing the business s owner as the guarantor. The card was kept current through payments made from the company s business account. A filer reported that its former employee allegedly traded employee identifying information to identity thieves in exchange for narcotics. A bank reported that an auto dealership employee allegedly used dealership customer identifying information to forge an application for an auto loan to purchase a vehicle on which a customer had already secured a legitimate loan. When the loan funded, the employee allegedly stole the proceeds. A bank reported that an employee working in its credit card operations unit had been implicated in a multi-year, million-dollar fraud that benefited the employee s family members and friends. In some intances, the alleged thieves used stolen identifiers to set up unauthorized credit card accounts. Several filers reported the deposit of large sums to prepaid cards intended solely to receive ACH credits. Filers determined that the source of funds was either the U.S. Treasury or a state revenue office. Further filer investigation revealed that the purchaser of the prepaid cards had allegedly used stolen identifying information to file fraudulent tax returns claiming multi-thousand dollar refunds. The refunds were routed electronically to the prepaid cards. A bank reported that a customer was receiving multiple ACH credits from tax refund anticipation loan companies for the benefit of multiple individuals other than the account holder. Though not specifically suggested by the filer, the subject may have filed false tax returns, claiming refunds using the identifiers of identity theft victims and received the proceeds of refund anticipation loans made on the basis of these false tax refund filings. 32
36 Two filings reported the setup of fraudulent mortgage brokers, which allegedly used identity data gathered from would-be borrowers to originate fraudulent mortgage loans without the knowledge or consent of the named borrowers. A bank reported the takeover of a customer s home equity line of credit account and the attempted clearing of a sizeable check against the account. The bank reported that the victim told a bank employee that the victim had been contacted by her family doctor asking for verification of the need to rush a copy of her medical file to a doctor located in the same state as the presumed identity thief. This may suggest that the identity thief was also intending to abuse the victim s medical benefits. A bank issuer of credit cards intended to be used to purchase medical services reported a fraudster who posed as multiple genuine healthcare providers using the providers legitimate license numbers and other identifiers. The subject also used multiple sets of stolen individual identifiers to open multiple credit accounts, and charged the cards for services purportedly provided by the various healthcare providers. The fraudster received payments from the issuing bank following his submission of these fraudulent charges. A bank reported that it determined that a customer s depository account had been used by alleged identity thieves as a passthrough account to accumulate funds stolen from corporations. The money was then transferred to foreign accounts. The account was used without the customer s knowledge and accessed with information collected when the customer responded to a phishing . An issuer of prepaid access cards reported receipt of multiple ACH credits to customer prepaid access cards. The credits were payable to third parties unrelated to the cardholders and drawn from online payment accounts. Further, the issuer reported subsequent card-to-card transfers, with all monies eventually transferred to the same depository account. The filer determined that the ACH debits were unauthorized. The filer suggested that the ACH debits were being collected on prepaid access cards held by unwitting participants in an Internet work scam. Proceeds were subsequently transferred to the fraudster s bank account net of commissions retained by the unwitting participants. 33
37 A bank reported that a credit card account was taken over and the mailing adress on the account fraudulently changed. The alleged identity thief proceeded to charge nearly $100,000 in less than 2 years, mainly through cash withdrawals. Virtually all of the money was repaid. The legitimate account holder apparently lost track of the account as the bank finally contacted him to inquire about account activity when payments became delinquent. Though not noted by the bank, the circumstances suggested the credit card account takeover may have been effectuated to launder funds, rather than to defraud the card issuer or account holder. A credit card issuing bank described a complex money laundering operation reliant upon identity theft. It reported that taken over credit card accounts were used to purchase gift cards at a major chain home improvement store. The gift cards were used to purchase large appliances that were eventually resold in independent (non-chain) appliance stores. A filer that makes student loans reported the operation of a student loan fraud ring that it had tied to dozens of fraudulent loans totaling several million dollars. The filer determined that all victims listed on the student loan applications had purchased vehicles at the same auto dealership. A filer that makes student loans reported that a fraudster made aggressive attempts to have fraudulent student loans approved by posing as both a university certifier of enrollment and as a fraud investigator. Several filings reported that alleged identity thieves set up fraudulent merchant accounts used to charge lost, stolen, or blocked credit card numbers for nonexistent merchandise or services. In some instances where cards were blocked, the perpetrator attempted to force charge the transactions. 33 A bank reported that a fraudster rented office space and impersonated an actual executive of an existing legitimate company. Bank officials met with the fraudster and granted a large line of credit, which the fraudster subsequently drained and transferred to accounts in another country. 33. Force charging occurs when a merchant does not obtain an approval code from the authorization system for the credit card, but rather manually enters the credit card number and a random approval code. Merchants often receive immediate credit in their designated bank account for these charges, which affords the identity thief a window of opportunity to complete the transaction before the charge is reversed as a result of the reconciliation process or complaints lodged by the legitimate credit card owner. 34
38 A bank reported that it had determined that a customer had opened dozens of individual and corporate checking accounts using sets of legitimate identifiers. The bank determined that the actual owners of the identifying information conspired to use the accounts to cash fraudulent and counterfeit items, and then claim to be victims of identity theft, thus defrauding the filer, which the conspirators expected to write off the associated account losses. A bank reported that an individual befriended multiple bank customers who lacked basic English skills and offered to help them with their banking activities. The individual then used the bank customers identifying information to apply for unsecured loans. 35
39 NEXT STEPS Financial Crimes Enforcement Network The continued annual reporting levels of identity theft filings support the findings of other identity theft studies using different methodologies that identity theft is a significant and growing burden upon the nation s economy. A Javelin Strategy and Research study found that 11.1 million Americans were victims of identity theft in 2009, a surge of 12 percent from the previous year, with an estimated $54 billion cost to the U.S. economy. 34 Identity theft also has less quantifiable, but significant, impacts on public trust in financial accounts and payment systems. FinCEN will continue to monitor BSA filings related to identity theft and expects to issue additional reports on SAR reporting of identity theft by the securities and futures industries, casinos, and money services businesses. In addition, FinCEN plans to use the data and findings reported in this study as a baseline for a future study to determine the effects that the Identity Theft Red Flag rules have had upon identity theft-related SARs filed after the rules took effect on November 1, See B-in-2009.htm. Reference in this report to any specific commercial product, service, process, or enterprise, or the use of any commercial product or enterprise, trade, firm, or corporation name is for the information and convenience of the public, and does not constitute endorsement or recommendation by the Financial Crimes Enforcement Network. With respect to materials generated by entities outside of the Financial Crimes Enforcement Network, permission to use these materials, if necessary, must be obtained from the original source. The Financial Crimes Enforcement Network assumes no responsibility for the content or operation of other Web sites. 36
40 37
Regional Electricity Forecasting
Regional Electricity Forecasting presented to Michigan Forum on Economic Regulatory Policy January 29, 2010 presented by Doug Gotham State Utility Forecasting Group State Utility Forecasting Group Began
U.S. Department of Housing and Urban Development: Weekly Progress Report on Recovery Act Spending
U.S. Department of Housing and Urban Development: Weekly Progress Report on Recovery Act Spending by State and Program Report as of 3/7/2011 5:40:51 PM HUD's Weekly Recovery Act Progress Report: AK Grants
LexisNexis Law Firm Billable Hours Survey Top Line Report. June 11, 2012
LexisNexis Law Firm Billable Hours Survey Top Line Report June 11, 2012 Executive Summary by Law Firm Size According to the survey, we found that attorneys were not billing all the time they worked. There
COMMERCIAL FINANCE ASSOCIATION. Annual Asset-Based Lending and Factoring Surveys, 2008
COMMERCIAL FINANCE ASSOCIATION Annual Asset-Based Lending and Factoring Surveys, 2008 Non-Member Edition May 6, 2009 R.S. Carmichael & Co., Inc. Commercial Finance Association 70 West Red Oak Lane (4 th
Cancellation of Debt (COD) R. Bruce McCommons Harford County, MD TrC 12/4/2013 [email protected]
Cancellation of Debt (COD) R. Bruce McCommons Harford County, MD TrC 12/4/2013 [email protected] 1 Cancellation of debt (COD)... Generally, if a debt for which the taxpayer was personally responsible
How To Rate Plan On A Credit Card With A Credit Union
Rate History Contact: 1 (800) 331-1538 Form * ** Date Date Name 1 NH94 I D 9/14/1998 N/A N/A N/A 35.00% 20.00% 1/25/2006 3/27/2006 8/20/2006 2 LTC94P I F 9/14/1998 N/A N/A N/A 35.00% 20.00% 1/25/2006 3/27/2006
INTRODUCTION. Figure 1. Contributions by Source and Year: 2012 2014 (Billions of dollars)
Annual Survey of Public Pensions: State- and Locally- Administered Defined Benefit Data Summary Report: Economy-Wide Statistics Division Briefs: Public Sector By Phillip Vidal Released July 2015 G14-ASPP-SL
VCF Program Statistics (Represents activity through the end of the day on June 30, 2015)
VCF Program Statistics (Represents activity through the end of the day on June 30, 2015) As of June 30, 2015, the VCF has made 12,712 eligibility decisions, finding 11,770 claimants eligible for compensation.
ANTHONY P. CARNEVALE NICOLE SMITH JEFF STROHL
State-Level Analysis HELP WANTED PROJECTIONS of JOBS and EDUCATION REQUIREMENTS Through 2018 JUNE 2010 ANTHONY P. CARNEVALE NICOLE SMITH JEFF STROHL Contents 1 Introduction 3 U.S. Maps: Educational concentrations
NAAUSA Security Survey
NAAUSA Security Survey 1. How would you rate the importance of each of the following AUSA security improvements. Very important Somewhat important Not too important Not at all important Secure parking
TITLE POLICY ENDORSEMENTS BY STATE
TITLE POLICY ENDORSEMENTS BY STATE State Endorsement ID Endorsement Description AK ARM ALTA 6 Adjustable (Variable) Rate AK BALLOON FNMA Balloon Endorsement AK CONDO ALTA 4 Condominium AK COPY FEE Copies
Hail-related claims under comprehensive coverage
Bulletin Vol. 29, No. 3 : April 2012 Hail-related claims under comprehensive coverage Claims for hail damage more than doubled in 2011 compared with the previous three years. Hail claims are primarily
Notices of Cancellation / Nonrenewal and / or Other Related Forms
Forms are listed alphabetically by form title. INDEX POLICY CODES 1. Auto 2. Fire and Multiple Peril 3. Liability 4. Property, other than Fire and Multiple Peril (e.g. Crime & Inland Marine) 5. Workers
STATE INCOME TAX WITHHOLDING INFORMATION DOCUMENT
STATE INCOME TAX WITHHOLDING INFORMATION DOCUMENT Zurich American Life Insurance Company (ZALICO) Administrative Offices: PO BOX 19097 Greenville, SC 29602-9097 800/449-0523 This document is intended to
2016 Individual Exchange Premiums updated November 4, 2015
2016 Individual Exchange Premiums updated November 4, 2015 Within the document, you'll find insights across 50 states and DC with available findings (i.e., carrier participation, price leadership, gross
Financial Crimes Enforcement Network. Identity Theft. Trends, Patterns, and Typologies Based on Suspicious Activity Reports
Identity Theft Trends, Patterns, and Typologies Based on Suspicious Activity Reports Filed by the Securities and Futures Industries January 1, 2005 December 31, 2010 September 2011 i Table of Contents
State Corporate Income Tax-Calculation
State Corporate Income Tax-Calculation 1 Because it takes all elements (a*b*c) to calculate the personal or corporate income tax, no one element of the corporate income tax can be analyzed separately from
Florida Workers Comp Market
Florida Workers Comp Market 10/5/10 Lori Lovgren 561-893-3337 [email protected] Florida Workers Compensation Rates 10-1-03 1-1-11 to 1-1-11* Manufacturing + 9.9% 57.8% Contracting + 7.3% 64.4 % Office
Legal Concepts Meet Technology: A 50 State Survey of Privacy Laws
Legal Concepts Meet Technology: A 50 State Survey of Privacy Laws Miriam B. Russom University of Illinois at Chicago, Computer Science Department Robert H. Sloan University of Illinois at Chicago, Computer
Health Insurance Price Index Report for Open Enrollment and Q1 2014. May 2014
Health Insurance Price Index Report for Open Enrollment and May 2014 ehealth 5.2014 Table of Contents Introduction... 3 Executive Summary and Highlights... 4 Nationwide Health Insurance Costs National
United States Bankruptcy Court District of Arizona NOTICE TO: DEBTOR ATTORNEYS, BANKRUPTCY PETITION PREPARERS AND DEBTORS
United States Bankruptcy Court District of Arizona NOTICE TO: DEBTOR ATTORNEYS, BANKRUPTCY PETITION PREPARERS AND DEBTORS UPDATED REQUIREMENTS FOR FORMAT OF MASTER MAILING LIST The meeting of creditors
United States Bankruptcy Court District of Arizona
United States Bankruptcy Court District of Arizona NOTICE TO: DEBTOR ATTORNEYS, BANKRUPTCY PETITION PREPARERS AND DEBTORS UPDATED REQUIREMENTS FOR FORMAT OF MASTER MAILING LIST The meeting of creditors
NHIS State Health insurance data
State Estimates of Health Insurance Coverage Data from the National Health Interview Survey Eve Powell-Griner SHADAC State Survey Workshop Washington, DC, January 13, 2009 U.S. DEPARTMENT OF HEALTH AND
LIMITED PARTNERSHIP FORMATION
LIMITED PARTNERSHIP FORMATION The following Chart has been designed to allow you in a summary format, determine the minimum requirements to form a limited partnership in all 50 states and the District
Mortgage Loan Fraud Update
Financial Crimes Enforcement Network Mortgage Loan Fraud Update Suspicious Activity Report Filings In Calendar Year 2012 August 2013 i Table of Contents Introduction 1 Summary of Filings 2 Subject States
AAIS Mobile-Homeowners 2008 Series
Policy Forms and Endorsements IT IS WOLTERS KLUWER FINANCIAL SERVICES' POLICY TO LIMIT THE SALE OF BUREAU FORMS TO THE MEMBERS AND SUBSCRIBERS OF THOSE RESPECTIVE BUREAUS. PURCHASE AND USE OF BUREAU FORMS
Small Business Credit Outlook
2015 Q2 Small Business Credit Outlook A Change Will Do You Good Foreign markets falling. The U.S. economy holding up relatively well due to the consumer. Technology radically changing entire industries
Offer in Compromise. Attach Application Fee and Payment (check or money order) here. IRS Received Date. (Rev. May 2012) Section 3
Form 656 (Rev. May 2012) Department of the Treasury Internal Revenue Service Offer in Compromise Attach Application Fee and Payment (check or money order) here. Section 1 Your Contact Information Your
STATES VEHICLE ASSET POLICIES IN THE FOOD STAMP PROGRAM
820 First Street NE, Suite 510 Washington, DC 20002 Tel: 202-408-1080 Fax: 202-408-1056 [email protected] www.cbpp.org Revised July 1, 2008 STATES VEHICLE ASSET POLICIES IN THE FOOD STAMP PROGRAM States
Table 12: Availability Of Workers Compensation Insurance Through Homeowner s Insurance By Jurisdiction
AL No 2 Yes No See footnote 2. AK No Yes No N/A AZ Yes Yes Yes No specific coverage or rate information available. AR No Yes No N/A CA Yes No No Section 11590 of the CA State Insurance Code mandates the
Federation of State Boards of Physical Therapy Jurisdiction Licensure Reference Guide Topic: PTA Supervision Requirements
These tables provide information on what type of supervision is required for PTAs in various practice settings. Definitions Onsite Supervision General Supervision Indirect Supervision The supervisor is
Federation of State Boards of Physical Therapy Jurisdiction Licensure Reference Guide Topic: Continuing Competence
This document reports CEU requirements for renewal. It describes: Number of required for renewal Who approves continuing education Required courses for renewal Which jurisdictions require active practice
Required Minimum Distribution Election Form for IRA s, 403(b)/TSA and other Qualified Plans
Required Minimum Distribution Election Form for IRA s, 403(b)/TSA and other Qualified Plans For Policyholders who have not annuitized their deferred annuity contracts Zurich American Life Insurance Company
Nurse Practitioners and Physician Assistants in the United States: Current Patterns of Distribution and Recent Trends. Preliminary Tables and Figures
Nurse Practitioners and Physician Assistants in the United States: Current Patterns of Distribution and Recent Trends Preliminary Tables and Figures Kevin M. Stange, PhD Assistant Professor Gerald R. Ford
Dashboard. Campaign for Action. Welcome to the Future of Nursing:
Welcome to the Future of Nursing: Campaign for Action Dashboard About this Dashboard: These are graphic representations of measurable goals that the Campaign has selected to evaluate our efforts in support
Terms & Conditions Website E-Boutique
Terms & Conditions Website E-Boutique 1. General: The following terms and conditions and any other related rules made available in writing by Bernardaud (collectively the Conditions of sale ) are applicable
How To Regulate Rate Regulation
Rate Regulation Introduction Concerns over the fairness and equity of insurer rating practices that attempt to charge higher premiums to those with higher actual and expected claims costs have increased
Foreign Language Enrollments in K 12 Public Schools: Are Students Prepared for a Global Society?
Foreign Language s in K 2 Public Schools: Are Students Prepared for a Global Society? Section I: Introduction Since 968, the American Council on the Teaching of Foreign Languages (ACTFL) has conducted
New York Public School Spending In Perspec7ve
New York Public School Spending In Perspec7ve School District Fiscal Stress Conference Nelson A. Rockefeller Ins0tute of Government New York State Associa0on of School Business Officials October 4, 2013
State Annual Report Due Dates for Business Entities page 1 of 10
State Annual Report Due Dates for Business Entities page 1 of 10 If you form a formal business entity with the state, you may be required to file periodic reports on the status of your entity to preserve
ehealth Price Index Trends and Costs in the Short-Term Health Insurance Market, 2013 and 2014
ehealth Price Index Trends and Costs in the Short-Term Health Insurance Market, 2013 and 2014 June 2015 1 INTRODUCTION In this report, ehealth provides an analysis of consumer shopping trends and premium
Enrollment Snapshot of Radiography, Radiation Therapy and Nuclear Medicine Technology Programs 2013
Enrollment Snapshot of Radiography, Radiation Therapy and Nuclear Medicine Technology Programs 2013 A Nationwide Survey of Program Directors Conducted by the American Society of Radiologic Technologists
Federation of State Boards of Physical Therapy Jurisdiction Licensure Reference Guide Topic: Continuing Competence
This document reports CEU (continuing education units) and CCU (continuing competence units) requirements for renewal. It describes: Number of CEUs/CCUs required for renewal Who approves continuing education
LexisNexis Law Firm Billable Hours Survey Report
LexisNexis Law Firm Billable Hours Survey Report Executive Summary Despite the critical impact on a firm s bottom line, it remains challenging for some attorneys and legal staff to efficiently capture
ENS Governmental Format Status (As of 06/16/2008)
Alaska AK Production (G) Region D Tan - Development Required Alabama AL Production (G) Region C Arkansas AR Production (G) Region C D Yellow - Pended for required Beta Site Green - In Production - Direct
The Survey of Undergraduate and Graduate Programs in Communication. Sciences and Disorders has been conducted since 1982-83. Surveys were conducted in
Introduction The Survey of Undergraduate and Graduate Programs in Communication Sciences and Disorders has been conducted since 1982-83. Surveys were conducted in 1982-83, 1983-84, 1984-85, 1985-86, 1986-87,
FR Y-14Q: Retail US Auto Loan Schedule Instructions
FR Y-14Q: Retail US Auto Loan Schedule Instructions This document provides general guidance and data definitions for the US Auto Loan Schedule. For the International Auto Loan Schedule, see the separate
States Future Economic Standing
States Future Economic Standing if current education levels remain the same. Presentation by Joe Marks SREB Director of Data Services State Leaders Forum St. Petersburg, Florida November 17, 2004 1 The
In Utilization and Trend In Quality
AHA Taskforce on Variation in Health Care Spending O Hare Hilton, Chicago February 10, 2010 Allan M. Korn, M.D., FACP Senior Vice President, Clinical Affairs and Chief Medical Officer Variation In Utilization
Standardized Pharmacy Technician Education and Training
Standardized Pharmacy Technician Education and Training Kevin N. Nicholson, RPh, JD Vice President, Pharmacy Regulatory Affairs National Association of Chain Drug Stores May 19, 2009 Overview of how technicians
Alaska (AK) Arizona (AZ) Arkansas (AR) California-RN (CA-RN) Colorado (CO)
Beth Radtke 50 Included in the report: 7/22/2015 11:15:28 AM Alaska (AK) Arizona (AZ) Arkansas (AR) California-RN (CA-RN) Colorado (CO) Connecticut (CT) Delaware (DE) District Columbia (DC) Florida (FL)
The Case for Change The Case for Whopping Big Change
TESTIMONY The California Assembly Higher Education Committee October 7, 2013 Presentation by: David Longanecker President, Western Interstate Commission for Higher Education (WICHE) FINANCING CALIFORNIA
Rates and Bills An Analysis of Average Electricity Rates & Bills in Georgia and the United States
Rates and Bills An Analysis of Average Electricity Rates & Bills in Georgia and the United States During regulatory and public policy discussions of electricity costs for Georgia ratepayers, the conversation
Ambulance Industry Receives Financial Relief Through the MMA
Ambulance Industry Receives Financial Relief Through the MMA On June 25, 2004, the Centers for Medicare and Medicaid Services (CMS) issued Transmittal 220 to Medicare Contractors outlining changes to the
What you need to know about your account
The information in this disclosure may not be entirely accessible to screen readers. If you have any questions please contact your Wells Fargo banker or call our National Business Banking Center at 1-800-225-5935.
The Lincoln National Life Insurance Company Variable Life Portfolio
The Lincoln National Life Insurance Company Variable Life Portfolio State Availability as of 12/14/2015 PRODUCTS AL AK AZ AR CA CO CT DE DC FL GA GU HI ID IL IN IA KS KY LA ME MP MD MA MI MN MS MO MT NE
MEDCHI, THE MARYLAND STATE MEDICAL SOCIETY HOUSE OF DELEGATES CL Report 3-13. A Fifty State Survey of Tort Reform Provisions
MEDCHI, THE MARYLAND STATE MEDICAL SOCIETY HOUSE OF DELEGATES CL Report 3-13 INTRODUCED BY: SUBJECT: REFERRED TO: Council on Legislation A Fifty State Survey of Tort Reform Provisions Reference Committee
Table 1: Advertising, Marketing and Promotional Expense as a Percentage of Net Operating Revenue
Table 1: Advertising, Marketing and Promotional Expense as a Percentage of Net Operating Revenue NAIC Group % Attorney s Title 3.8% Chicago / Fidelity 0.9% Diversified 0.6% First American 2.7% Investors
Table 11: Residual Workers Compensation Insurance Market By Jurisdiction
Table 11: Residual Workers Market By AL Yes/NCCI 3 Two declination AK Yes/NCCI Two declination AZ Yes/NCCI Three declination, including one from the State Fund Agent/ ()/ Access? 4 Recommend NWCRP Recommend
Benefits of Selling WorkLife 65
PruTerm WorkLife 65 SM LEARN ABOUT THE PRODUCT AND MARKET Benefits of Selling WorkLife 65 Pru s new and innovative term product will resonate with your clients. WorkLife 65 is a new and innovative term
Final Expense Life Insurance
Dignified Choice - Classic Series Final Expense Life Insurance Columbian Mutual Life Insurance Company Home Office: Binghamton, NY Administrative Service Office: Norcross, GA Columbian Life Insurance Company
50-State Analysis. School Attendance Age Limits. 700 Broadway, Suite 810 Denver, CO 80203-3442 303.299.3600 Fax: 303.296.8332
0-State Analysis School Attendance Age Limits 700 Broadway, Suite 810 Denver, CO 80203-32 303.299.3600 Fax: 303.296.8332 Introduction School Attendance Age Limits By Marga Mikulecky April 2013 This 0-State
OVERPAYMENTS IN GENERAL
IN GENERAL This chapter deals with state law provisions identifying, establishing, and collecting overpayments. All states have provisions addressing these matters. A state s law generally differs in the
Mortgage Broker / Mortgage Originator Bond Requirements Nationwide
Surety One Email: [email protected] Facsimile: 919-834-7039 Mail: P.O. Box 37284, Raleigh, NC 27627 Mortgage Broker / Mortgage Originator Bond Requirements Nationwide AK Mortgage Broker License
Enrollment Snapshot of Radiography, Radiation Therapy and Nuclear Medicine Technology Programs 2014
Enrollment Snapshot of, Radiation Therapy and Nuclear Medicine Technology Programs 2014 January 2015 2015 ASRT. All rights reserved. Reproduction in any form is forbidden without written permission from
Driving under the influence of alcohol or
National Survey on Drug Use and Health The NSDUH Report December 9, 2010 State Estimates of Drunk and Drugged Driving In Brief Combined 2006 to 2009 data indicate that 13.2 percent of persons aged 16 or
States Served. CDFI Fund 601 Thirteenth Street, NW, Suite 200, South, Washington, DC 20005 (202) 622-8662 25
s Served CDFI Fund 601 Thirteenth Street, NW, Suite 200, South, Washington, DC 20005 (202) 622-8662 25 New Markets Tax Credit Program Sixth Round (2008) s Served NOTES: (1) Allocatees that are italicized
Annual Survey of Public Pensions: State- and Locally- Administered Defined Benefit Data Summary Brief: 2015
Annual Survey of Public Pensions: State- and Locally- Administered Defined Benefit Data Summary Brief: Economy-Wide Statistics Division Briefs: Public Sector Graphical Summary By Phillip Vidal Released
Health Insurance Exchanges and the Medicaid Expansion After the Supreme Court Decision: State Actions and Key Implementation Issues
Health Insurance Exchanges and the Medicaid Expansion After the Supreme Court Decision: State Actions and Key Implementation Issues Sara R. Collins, Ph.D. Vice President, Affordable Health Insurance The
Community College/Technical Institute Mission Convergence Study
Center for Community College Policy Education Commission of the States Community College/Technical Institute Mission Convergence Study Phase 1: Survey of the States Prepared by Donald E. Puyear, Ph.D.
Download at www.iii.org/presentations
Residual Markets, Uninsured Motorists and Competition in Maryland Auto Insurance Maryland Auto Insurance Plan Senate Hearing on Uninsured Motorists Annapolis, MD December 16, 2015 Download at www.iii.org/presentations
The Vermont Legislative Research Shop
The Vermont Legislative Research Shop State Responses to Terrorism Every state has responded in some way to the events of September 11 th. Most states have named a Director of Homeland or a liaison to
NEW CARRIER SIGN UP REQUEST FORM
Instructions: (Please fax or email the completed documents) [email protected] Fax: 1-855-631-4174 o Fill o Copy o Copy o initial o Insurance out Carrier profile of Common Carrier Authority Company
Mapping State Proficiency Standards Onto the NAEP Scales:
Mapping State Proficiency Standards Onto the NAEP Scales: Variation and Change in State Standards for Reading and Mathematics, 2005 2009 NCES 2011-458 U.S. DEPARTMENT OF EDUCATION Contents 1 Executive
How To Get A National Rac (And Mac)
7 th National RAC (and MAC) Summit December 5 6, 2012 Washington, DC Jane Snecinski P.O. Box 12078 Atlanta, GA 30355 www.postacuteadvisors.com National client base (both public and private sector) based
STATUS OF ITEM FILINGS
National Council on Compensation Insurance Regulatory Services JUNE 3, 2016 STATUS OF ITEM FILINGS IF-2016-06-01 ACTION NEEDED BACKGROUND IMPACT NCCI ACTION PERSON TO CONTACT Review changes in the Status
FOREIGN LIMITED LIABILITY COMPANY REGISTRATION CHART
FOREIGN LIMITED LIABILITY COMPANY REGISTRATION CHART When a Limited Liability Company desires to transact business in a jurisdiction other than its state of formation it must comply with the statutes of
5% to 25%. This APR varies by state.
STATEMENT OF CREDIT CARD TERMS SPEEDWAY COMMERCIAL & CONSUMER CARDS RETAIL INSTALLMENT CREDIT AGREEMENT CREDIT SALE CONTRACT Listed below are the terms governing the Speedway Commercial Credit Card Account,
Motor Vehicle Financial Responsibility Forms
Alphabetical Index Forms are listed alphabetically by form title. Important Note: The forms shown herein for each state may not be a complete listing of all the financial responsibility forms that are
Vocational Rehabilitation
Vocational Rehabilitation Senate Education Appropriations Committee October 7, 2015 Emily Sikes, Chief Legislative Analyst, OPPAGA oppaga THE FLORIDA LEGISLATURE S OFFICE OF PROGRAM POLICY ANALYSIS & GOVERNMENT
Department of Legislative Services
Department of Legislative Services Maryland General Assembly 2008 Session HB 1169 FISCAL AND POLICY NOTE House Bill 1169 Ways and Means (Delegate Barve) Sales and Use Tax - Computer Services Exemption
Community Eligibility Option: Guidance and Procedures for Selection of States for School Year 2012-2013
United States Department of Agriculture Food and Nutrition Service 3101 Park Center Drive Alexandria, VA 22302-1500 DATE: February 9, 2012 MEMO CODE: SP 12-2012 SUBJECT: TO: Community Eligibility Option:
1. Full Name of Assured: 2. Address (MUST be a Physical Address): (City) (State) (Zip) Phone Number: ( ) Fax Number: ( ) Email Address:
ARBITRATORS, HEARING OFFICERS AND MEDIATORS PROFESSIONAL LIABILITY INSURANCE issued to the NATIONAL ASSOCIATION OF SALARIED PROFESSIONALS PURCHASING GROUP, INC. and specified members of the AMERICAN BAR
Preapproval Inspections for Manufacturing. Christy Foreman Deputy Director Division of Enforcement B Office of Compliance/CDRH
Preapproval Inspections for Manufacturing Christy Foreman Deputy Director Division of Enforcement B Office of Compliance/CDRH Major Steps Review of the Quality System information Inspection requests generated
LIMITED LIABILITY COMPANY ORGANIZATION CHART
LIMITED LIABILITY COMPANY ORGANIZATION CHART The following Chart has been designed to allow you in a summary format, determine the minimum requirements to form a limited liability company in all 50 states
January 2015. Report on SBLF Participants Small Business Lending Growth Submitted to Congress pursuant to Section 4106(3) of
January 2015 Report on SBLF Participants Small Business Lending Growth Submitted to Congress pursuant to Section 4106(3) of the Small Business Jobs Act of 2010 OVERVIEW Small businesses are a vital part
The following rates are the maximum rates that should be illustrated. Be sure to update the IRIS illustration system
INTEREST RATES - June 16, 2016 to July 15, 2016 Notices 1. Before soliciting or taking any annuity applications, it is required that you have completed Lafayette Life's Annuity Training and any Continuing
5% to 21%. This APR varies by state. Please refer to Section 3 for details.
IMPORTANT NOTICE STATEMENT OF CREDIT CARD TERMS MARATHON COMMERCIAL REGULAR CARD RETAIL INSTALLMENT CREDIT AGREEMENT CREDIT SALE CONTRACT Listed below are the terms governing the Marathon Commercial Regular
Forethought Medicare Supplement and ForeLife Final Expense Life Insurance Phase 1
Forethought Medicare Supplement and ForeLife Final Expense Life Insurance Phase 1 FOR AGENT USE ONLY NOT FOR USE WITH CONSUMERS 1 Company History Forethought Financial Group, Inc., through its subsidiaries,
Date: January 21, 2014 All Approved Mortgagees Mortgagee Letter 2014-02
U.S. DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT WASHINGTON, DC 20410-8000 ASSISTANT SECRETARY FOR HOUSING- FEDERAL HOUSING COMMISSIONER Date: January 21, 2014 To: All Approved Mortgagees Mortgagee Letter
Ending Veteran and Veteran Family Homelessness: The Homeless Veteran Supported Employment Program (HVSEP)
Ending Veteran and Veteran Family Homelessness: The Homeless Veteran Supported Employment Program (HVSEP) Carma A. Heitzmann, Ph.D. National Program Manager HVSEP VHA Homeless Program Office [email protected]
Building a Market for Small Wind: The Break-Even Turnkey Cost of Residential Wind Systems in the United States
Building a Market for Small Wind: The Break-Even Turnkey Cost of Residential Wind Systems in the United States Ryan H. Wiser Lawrence Berkeley National Laboratory [email protected]; 510-486-5474 Global WINDPOWER
An Introduction to... Equity Settlement
An Introduction to... Equity Settlement The New York CEMA & Co-op Process June 2009 About Us... Established in 1986 Over 100 Associates Approved Vendor for Bank of America Preferred Vendor for Many National
TAX PREP FEE PHILOSOPHY. Copyright 2013 Drake Software
TAX PREP FEE PHILOSOPHY Copyright 2013 Drake Software Table of Contents Tax Prep Fee Survey Introduction... 2 Profile of Respondents... 3 Tax Prep Fee Averages - Federal Forms... 4 1040 Prep Fee Averages
Motor Vehicle Financial Responsibility Forms
Alphabetical Index Forms are listed alphabetically by form title. Important Note: The forms shown herein for each state may not be a complete listing of all the financial responsibility forms that are
AN INSIDE LOOK AT SOCIAL RECRUITING IN THE USA
AN INSIDE LOOK AT SOCIAL RECRUITING IN THE USA THE BULLHORN REACH RANKINGS REPORT TM WWW.BULLHORNREACH.COM @BULLHORNREACH JUNE 2012 COPYRIGHT 2012 BULLHORN, INC. ALL RIGHTS RESERVED. EXECUTIVE SUMMARY
Broadband Technology Opportunities Program: Sustainable Broadband Adoption and Public Computer Centers
Broadband Technology Opportunities Program: Sustainable Broadband Adoption and Public Computer Centers National Telecommunications and Information Agency (NTIA) U. S. Department of Commerce Funded by the
The 80/20 Rule: How Insurers Spend Your Health Insurance Premiums
SUMMARY The 80/20 Rule: How Insurers Spend Your Health Insurance Premiums The Affordable Care Act holds health insurers accountable to consumers and ensures that American families receive value for their
