FINANCIAL CRIMES. Lesson Plan and Course Outline. INSTRUCTOR EQUIPMENT/MATERIALS PowerPoint, LCD Projector, Computer, and Handouts



Similar documents
SECURITY FREEZE INFORMATION Any consumer in Texas may request a security freeze in writing by certified mail to the credit reporting agency.

SECURITY FREEZE INFORMATION

SECURITY FREEZE INFORMATION

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09

Identity Theft. Presented By: Information Technology. James Blackwood, Michael Fouts, & Tiffany Mixon

Identity Theft. Officer Rob Romey IPD Crime Prevention Officer.

Corona Police Department

THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT

Citi Identity Theft Solutions

Identity Theft Information

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

MACOMB COUNTY SHERIFF S OFFICE IDENTITY THEFT VICTIM S PACKET

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Identity Theft. Emergency Repair Kit

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit

Identity Theft: Knowledge, Preparation, and Planning. Presented by: North Carolina Bar Association Antitrust & Trade Regulation Section

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

Identity Theft Protection

Leander Police Department 705 Leander Dr Leander, Texas (512)

Information to Protect Our Customers From Identity Theft

EL/Civics Lesson Plan

WICHITA POLICE DEPARTMENT 455 N. Main Wichita, KS 67202

IDENTITY THEFT: MINIMIZING YOUR RISK

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009

Do s & Don ts Reference website.

I dentity theft occurs

MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage.

NCUA LETTER TO CREDIT UNIONS

According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection

identity theft: How To Safeguard Your Privacy and Keep Your Good Name

Protect Yourself From Identity Theft

I know what is identity theft but how do I know if mine has been stolen?

Tempe Police Department Victim s Fraud Packet

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009

Standard 9: The student will identify and explain consumer fraud and identity theft.

Identity Theft Grade Level 10-12

OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009

Client Resources SAFEGUARDING YOUR IDENTITY. Your personal and financial information is precious. Protect it by being savvy about identity theft.

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

Protection. Identity. What should I do if I m. Common ID Theft TACTICS. a criminal obtains your personal information and uses it for his/her own gain.

Identity Theft Packet

Identity Theft Prevention Presented by: Matt Malone Assero Security

Deputy Mike Butler Deputy Leslie Fox Dane County Sheriff s Office

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

T E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S I D E N T I T Y T H E F T G U I D E

Employee ID Theft Resource Guide

IDENTITY THEFT RESOURCE KIT

Protecting Yourself from Identity Theft

Beware! Identity Theft

Intercepting your mail. They can complete change of address forms and receive mail that s intended for you.

FRAUD PACKET. Instructions and Useful Information. Mesa Police Department Attention Financial Crimes PO Box 1466 Mesa, AZ

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT

1611 E. PFENNIG LN., P.O. BOX 679 PFLUGERVILLE, TEXAS PFLUGERVILLE POLICE DEPARTMENT INSTRUCTIONS

DVD Companion Learning Guide

SCAM JAM ID Theft. Presented by: Lori Farris Office of the Attorney General Office of Consumer Protection

Identity Theft. Protecting Your Credit Identity G1

Identity Theft Victim s Packet

Identity Theft: Prevention & Survival

How To Get A Credit Card From A Fraudulent Account

Financial Crime Report

What is Identity Theft?

MISSISSIPPI IDENTITY THEFT RANKING BY STATE: Rank 32, 57.3 Complaints Per 100,000 Population, 1673 Complaints (2007) Updated December 21, 2008

PROTECTION GUIDE Learn the Essentials & Immediate Steps to Protect Your Identity

Identity Theft Victim s Packet

IDENTITY PROTECTION MEMBER. Protect Your Identity. Security of Personal Information is Our Top Priority

Lake County Sheriff s Office Identity Theft/Fraud Packet

Avondale Police Department Identity Theft / Fraud / Forgery Victim's Packet

Transcription:

FINANCIAL CRIMES Lesson Plan and Course Outline Instructor Detective Kelly Smith Method of Presentation Lecture Duration 8 Hours Trainee Equipment/Materials Note taking material INSTRUCTOR EQUIPMENT/MATERIALS PowerPoint, LCD Projector, Computer, and Handouts GOAL STATEMENT This course is designed to instruct and assist patrol officers and detectives in the reporting and investigation of financial crimes. The course will also assist officers in identifying current trends and methods of assisting victims, preparing cases for prosecution, identifying different types of financial crimes and how to apply these methods to financial crimes cases. COURSE OUTLINE: I. Introduction to Financial Crimes A. Different types of crimes B. Different investigative methods and approaches to certain crimes II. III. The First Steps of the Investigation A. Review Police Report B. Prioritize individual case for investigation 1. Are there any suspects? 2. Is there any evidence to obtain for an investigation? 3. Are there any witnesses to interview? C. Determine what is needed for each case Evidence A. Types of Evidence 1. Video 2. Bank records 3. Cell phone records 4. Fingerprints, either real or digital 5. Witness and victim statements 6. Computer data from victim or suspect

B. How to obtain evidence 1. Phone 2. Email 3. Subpoena 4. Search warrant IV. Victim A. Establish and maintain contact with victim B. Keep victim informed of progress with case C. Feed back and input from the victim regarding potential suspects D. Obtaining related documentation from the victim 1. Credit card and bank account numbers 2. Copies of statements 3. Copies of any related documentation V. Multi-Jurisdictional Investigations A. Establish contact with any assisting investigative agencies 1. Local law enforcement 2. State Agencies DPS, Attorney General 3. Federal Agencies Secret Service Task Force, FBI, Federal Trade Commission 4. Non-law enforcement Bank investigators, loss prevention personnel B. Establish contact with prosecutors and judges. 1. Legal questions 2. Issuing subpoenas 3. Issuing search warrants 4. Seizure of property and/or assets VI. Case Preparation for Presentation and Prosecution A. Does the case meet the elements of the listed offense? B. Does the case meet the elements of a higher or lower class of offense? C. What is need for presentation in court? videos, power point, statements, evidence, related documentation, Business Records Affidavit

FINANCIAL CRIMES LEARNING OBJECTIVES The student will be able to recognize the types of identity crime - Types of identity crimes include identity theft, credit card/access device fraud ( skimming ), check fraud, bank fraud, false identification fraud, and passport/visa fraud. The student will be able to provide a definition of identity crime - Identity crime is the theft or misuse of personal or financial identifiers in order to gain something of value and/or facilitate other criminal activity. The student will be able to identify types of crimes associated with identity crimes - In many instances an identity crime is used as a facilitator, through financing or anonymity, to commit other criminal activities such as mail theft, mail fraud, narcotics/drugs, organized crime, financial fraud (money laundering), mortgage fraud, weapons trafficking, homicide, terrorism, wire fraud, or computer crime/internet intrusions. Identity crimes can begin with other seemingly unrelated crimes such as robbery (e.g. purse snatching or mugging), computer intrusion, mail theft, theft of trash ( dumpster diving ), or theft of documents or information from businesses, medical facilities, hotels, etc. The student will be able to list personal and financial identifiers -Personal identifiers include: name, date of birth, social security number, address, phone number, driver s license number, passport number, mother s maiden name, etc. Financial identifiers include: credit card numbers, bank account numbers, personal identification numbers ( PINs ), insurance account numbers, etc. The student will be able to identify currents trends associated with identity crimes - Some of the current trends associated with identity theft involve the usage of current technologies. This provides a unique challenge for consumers and law enforcement by testing their ability to keep up with technological advances and changes. Some of the more recent scams involve stealing information by listening in on conversations made on cellular phones, surreptitiously reading other people s faxes and emails, hacking into computers, conducting telephone and e-mail scams, and taking advantage of careless consumers online shopping and banking. The student will be able to recognize how identity crimes occur - 1. Stealing a wallet, purse, briefcase, etc., containing your identification, social security card, credit cards, bankcards or checkbook. 2. Stealing mail, especially your bank and credit card statements, pre-approved credit offers, new checks, or tax information. 3. Complete a change of address form to divert your mail to another location. 4. Rummage through your trash or the trash of businesses to find personal data (also known as dumpster diving ). 5. Fraudulently obtain your credit report by posing as a landlord, employer, or someone else who may have a legitimate need for (and legal right to) the information. 6. Find personal information in your home.

7. Obtain personal information that you share on the Internet. 8. Get information from the workplace, in a practice known as business record theft, by stealing files out of offices where you are a customer, employee, patient or student, by bribing an employee who has access to your files, or by hacking into electronic files. 9. Shoulder surfing : looking over your shoulder or from a nearby location as you enter your Personal Identification Number (PIN) at an ATM machine. This practice has gone high-tech, with some thieves utilizing hidden spy cameras positioned near ATMs to observe or record people as they enter their PINs. 10. Many criminals who want to obtain personal data from people online use a technique known as spoofing : the creation of e-mails and websites that appear to belong to legitimate businesses such as established retail companies, financial institutions, and online auctions sites. Consumers receive e-mails from thieves claiming to be legitimate businesses, and are directed to websites that appear to be run by those businesses. The consumers are then directed to enter large amounts of personal data. The thieves sending the e-mails or running the websites actually have no connection with those businesses, and their sole purpose is to obtain the consumers personal data so that they can engage in various fraud schemes. The student will be able to identify techniques used to procure false identification - A wide variety of sources, including bookstores and Internet retailers, provide publications that give criminals step-by-step instructions on techniques for producing false documents. The student will be able to recognize the legal aspects of identity crimes and identify the federal and state statutes dealing with identity crimes - Federal law: 18 U.S.C. 1028 Identity Theft and Assumption Deterrence Act State Law: Penal Code 32.51 Fraudulent Use or Possession of Identifying Information (State Jail Felony) Business and Commerce Code, Chapter 20, 35 and 48 - Regulation of Consumer Credit Reporting and Responsibility of Business Owners Code of Criminal Procedure, Article 55.02, Sec.2a Procedure for Expunction The student will be able to define the term security alert, according to the Business Code: Security Alert means a notice placed on a consumer file that alerts a recipient of a consumer report involving that consumer file that the consumer s identity may have been used without the consumer s consent to fraudulently obtain goods or services in the consumer s name. The student will be able to define security freeze, according to the Business Code: Security Freeze means a notice placed on a consumer file that prohibits a consumer reporting agency from releasing a consumer report relating to the extension of credit involving that consumer file without the express authorization of the consumer. The student will be able to list information needed for an ID crime offense report - Taking a written report is vital to the victim(s) because credit bureaus require a police report in order to block fraudulent information and to begin repairing the victim s credit reports. In addition, many financial institutions require a police report with an affidavit of fraud.

The student will be able to recognize techniques for educating victims and the public on identity crime - Emphasize the fact that the more a person becomes aware about his/her financial records the better prepared he/she will be if they become a victim of identity crime. Inform the public that they should: Not give out personal information over the phone or on the Internet - this includes their social security number, driver s license number, date of birth, place of birth, home address, mother s maiden name, and any passwords. Limit the amount of personal information on their checks - it is recommended that you do not put your driver s license, identification card or social security number on your checks. Check credit histories and bank records frequently and look for signs of inaccurate or suspicious activity. Keep detailed records of banking, check writing, credit card use, and ATM use Destroy carbon copies of credit card receipts Purchase a home shredder or completely destroy any item that may have personal identifiers rather than discarding them in the trash Note: Some insurance companies offer optional coverage to their policyholders

Detective Kelly Smith Grapevine Police Department 307 W Dallas Road Grapevine, TX 76051 Employment Longview, White Oak and Fort Worth Police Departments 1979 1986 Performed duties as a patrol officer, which included responding to calls for service, taking reports, interviewing witnesses and suspects and processing crime scenes. Grapevine Texas Police Department 1986 - present I spent 16 years in patrol and the last 5 years in CID investigating Financial Crimes including fraud, credit card abuse, forgery and identity theft. Accomplishments & Memberships January 2008 Deputized by the US Marshall s Office and currently a member of the United States Secret Service Task Force on Financial Crimes Current member of the Fraud Investigator s Association of Texas and Association of Certified Fraud Examiners