Similar documents
MANDATORY MINIMUM PENALTIES FOR IDENTITY THEFT OFFENSES

OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009

OFFICE OF THE UNITED STATES ATTORNEY SOUTHERN DISTRICT OF CALIFORNIA San Diego, California. United States Attorney Laura E. Duffy

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

MEMORANDUM FOR ASSISTANT REGIONAL COUNSEL (CRIMINAL TAX) SUBJECT: Identity Theft and Assumption Deterrence Act of 1998

MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009

WASHINGTON ASSOCIATION OF SHERIFFS AND POLICE CHIEFS Model Policy on Identity Theft Policy, Procedures, and Victim Referral Information

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009

MISSISSIPPI IDENTITY THEFT RANKING BY STATE: Rank 32, 57.3 Complaints Per 100,000 Population, 1673 Complaints (2007) Updated December 21, 2008

FEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008

Identity Theft in Maryland

Tips To Prepare. Audits/Investigations. For Prosecution

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

Attention: AT&T Theft of Identity Fax No: Or. P.O. Box 2767 Houston, TX

Section Fraud and related activity in connection with identification documents and information

WRITTEN TESTIMONY OF JOHN A

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

WASHINGTON IDENTITY THEFT RANKING BY STATE: Rank 13, 76.4 Complaints Per 100,000 Population, 4942 Complaints (2007) Updated January 11, 2009

Identity Theft and Tax Administration

Identity Theft Victim s Complaint and Affidavit

Identity Theft. Emergency Repair Kit

An Introduction to Identity Theft. Letbighelptoday.com. Your Free Copy

Chapter 15 Criminal Law and Procedures

RHODE ISLAND IDENTITY THEFT RANKING BY STATE: Rank 34, 56.0 Complaints Per 100,000 Population, 592 Complaints (2007) Updated January 5, 2009

TESTIMONY OF CAROLINE CIRAOLO ACTING ASSISTANT ATTORNEY GENERAL TAX DIVISION U.S. DEPARTMENT OF JUSTICE BEFORE THE

Identity Theft Victims Universal Complaint Form (FTC)

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

Criminal Investigation

A Working Definition of Identity Theft

FRAUD PACKET. Instructions and Useful Information. Mesa Police Department Attention Financial Crimes PO Box 1466 Mesa, AZ

Identity Theft Victim s Packet

Vulnerabilities in the U.S. Passport System Can Be Exploited by Criminals and Terrorists

Chapter IDENTITY AND ACCESS DEVICE CRIMES. Table of Instructions

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

ID Theft Toolkit and Affidavit

Diversion/Accountability Worthless Check Program RESTITUTION GUIDE FOR MERCHANTS AND RESIDENTS

Pasco County Sheriff's Office Economic Crime Unit. Identity Theft Guide

Criminal Investigation. Stolen Identity Refund Fraud (SIRF)

FTC Facts. For Consumers Federal Trade Commission. Maybe you never opened that account, but. Identity Crisis... What to Do If Your Identity is Stolen

Corona Police Department

Identity Theft: Your Good Name Gone Bad!

How To File An Identity Theft Complaint And Affidavit

ONEIDA COUNTY DISTRICT ATTORNEY WORTHLESS CHECK DIVERSION PROGRAM RESTITUTION GUIDE FOR MERCHANTS AND RESIDENTS

Identity Theft Victim s Packet

Tempe Police Department Victim s Fraud Packet

azag.gov PROTECT YOURSELF AGAINST IDENTITY THEFT Office of Arizona Attorney General TERRY GODDARD For more information, contact:

The City of West Linn Identity Theft Prevention Program

UNITED STATES COURT OF APPEALS FOR THE THIRD CIRCUIT. No UNITED STATES OF AMERICA. KAREN BATTLE, Appellant

Tax Refund Fraud and Identity Theft. IRS Criminal Investigation Special Agent Chad Cutting


ILLINOIS IDENTITY THEFT RANKING BY STATE: Rank 11, 80.2 Complaints Per 100,000 Population, Complaints (2007) Updated November 30, 2008

FINANCIAL CRIMES. Lesson Plan and Course Outline. INSTRUCTOR EQUIPMENT/MATERIALS PowerPoint, LCD Projector, Computer, and Handouts

CRIMINAL DEFENSE FAQ. QUESTION: Am I required to allow law enforcement be allowed to search my house or my car?

PENNSYLVANIA IDENTITY THEFT RANKING BY STATE: Rank 14, 72.5 Complaints Per 100,000 Population, 9016 Complaints (2007) Updated January 29, 2009

Protecting Yourself When You're a Victim of Identity Theft, Forgery or Fraud

IDENTITY THEFT PREVENTION PROGRAM

Identity Theft and Fraud

Lake County Sheriff s Office Identity Theft/Fraud Packet

Identity Theft Packet

I know what is identity theft but how do I know if mine has been stolen?

Why Avoiding LegalShield At Your Company Could Be Expensive For Your Business!

IDENTITY THEFT VICTIMS: IMMEDIATE STEPS

Leander Police Department 705 Leander Dr Leander, Texas (512)

Identity Theft Victim s Packet

Criminals and Immigration. The Effects of Convictions on Immigration Status

Identity Theft Victim Guide

Issue Brief. Arizona State Senate IDENTITY THEFT AND CONSUMER PROTECTION INTRODUCTION IDENTITY THEFT. September 17, 2015.

Citi Identity Theft Solutions

STATEMENT OF RONALD A. CIMINO DEPUTY ASSISTANT ATTORNEY GENERAL FOR CRIMINAL MATTERS, TAX DIVISION, U.S. DEPARTMENT OF JUSTICE BEFORE THE

Identity Theft - 10 Steps to Prevent It

Statement of Mr. Timothy Caddigan. Special Agent in Charge Criminal Investigative Division United States Secret Service

WHITE-COLLAR CRIMES IN CALIFORNIA DOMENIC J. LOMBARDO

Identity Theft Regulation. *Christine Stagnetto-Sarmiento, Oglala Lakota College, USA. *Corresponding Author, 490 Piya Wiconi Road-Kyle, South Dakota

TROY POLICE DEPARTMENT MERCHANTS GUIDE BAD CHECKS Page 1 of 13

The Attorney General s Office established the Identity Theft Unit in response to increased identity theft incidents reported by Indiana citizens and

2009 CALIFORNIA IDENTITY THEFT MATRIX 1 Some overlooked or underused statutes

Identity Theft Information

OFFICE OF KANSAS ATTORNEY GENERAL DEREK SCHMIDT

CITY OF ROCHESTER, MINNESOTA POLICE DEPARTMENT

FACT SHEET: PROJECT SAFE CHILDHOOD

Chapter 6 Appendix A

The Morrison County Attorney s Office

Instructions for Completing

Identity Theft. What it is and How to Protect Yourself

Chapter No. 911] PUBLIC ACTS, CHAPTER NO. 911 HOUSE BILL NO. 3403

PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT

OHIO S IDENTITY THEFT VICTIM ASSISTANCE KIT A guide for victims of identity theft, detailing what to do and who to contact.

Identity Theft: When Victims Need Legal Help

Identity Theft Assistance: Information for Recovering Your Good Name

IDENTITY THEFT VICTIM S PACKET

How To Get A Credit Card From A Fraudulent Account

Identity Theft Victim s Packet

The Increasing prevalence and Cost of Identity Theft

Protecting Your Tax Identity Tax Identity Theft Awareness Tips

City of Wyoming, Michigan Administrative Policy

THE RISKS, THE IMPACT AND DEVELOPING SOLUTIONS

POLICY: Identity Theft Red Flag Prevention

Transcription:

Investigation & Prosecution of Identity Crimes The Challenges and Opportunities of Federal, State and Local Coordination Executive Policy Forum on Cyber& Electronic Crime National Governors Association Center for Best Practices September 8, 2008 Arlington, Virginia

What is Identity Crime? The use of the means of identification of another person without lawful authority The use of false, fraudulent or fictitious identification documents The use of existing accounts, such as credit or other financial accounts, via access devices or other means The creation and use of synthetic identities.

Types of Identity Crime Classic Identity Theft Physical Impersonation Accidental Identity Theft Identity Brokers Synthetic Identity Theft Immigration-Related Identity Theft Terrorism-Related Identity Theft Identity Theft Related to Other Criminal Conduct.

Sources of Identity Information* Lost or stolen wallet, checkbook, credit card (33 %) Off-line transaction ti (23 %) Personal connection to identity thief (17%) Mail theft (6.0%) On-line identity theft (12 %) Data Breach (7%) Other (2%) Javelin Strategy & Research 2008 *Only 35 percent of victims knew the source of the compromise. Thus, these figures probably grossly under-represent represent online and data breach compromises.

What Are Identity Thieves Doing with the Identities? Charging merchandize to accounts Stealing money from existing accounts Obtaining new cellular or wireless service Account takeover Renting apartment Obtaining mortgages

What Are Identity Thieves Doing with the Identities? Qualifying for employment Obtaining medical services Evading prior criminal conduct Buying a car Opening financial accounts and passing bad checks Filing tax returns seeking refunds

So what? Consider the type of identity crime, the sources of identity information, and how it is being used. Some of it involves small local rings, some involves huge international rings. Some is limited to local victims and activity, some involves victims and activity it across many jurisdictions. Some of it generates small losses, some of it generates huge dollar losses. A lot of different agencies state and federal have jursidiction.

And? On the one hand, identity crime is tailor- made for turf battles, case sniping, and cases falling through the cracks. On the other hand, there are so many cases that there is plenty of work to go around, and plenty of options both for investigation and prosecution of deserving cases.

How to Address Identity Theft Requires a concerted effort the bad guys share information freely -- we need to follow suit. Requires the ability to move quickly to authorize, investigate and prosecute cases. Real Time Crimes Mobile Criminals Requires flexibility what works in one sort of identity theft case may not work in another.

Responding to the Challenge Recognizing that business as usual was insufficient to address identity theft, President Bush formed the President s s Identity Theft Task Force. Its mandate was to: Look at coordination issues Look at availability of Federal resources Develop recommendations for how to respond more effectively on a local, state and federal level.

President s s Identity Theft Task Force Strategic Plan Issued in April 2007 Recommended adoption of standard form FTC identity theft complaint form Recommended encouraging state prosecution of identity theft Recommended d targeting ti Health Care ID Theft, Document Fraud by Illegal Aliens and other specific initiatives. Recommended working more closely with financial institutions and other key players in the private sector.

President s Identity Theft Task Force Recommended closing statutory gaps as they are recognized. Aggravated Identity Theft Computer-Related Identity Theft Recommended extending victim enhancement in U.S. Sentencing Guidelines to victims who do not ultimately sustain a economic loss. Recommended Enhanced Training

President s s Identity Theft Task Force Recognized importance of coordination Recommended Appointment of Identity Theft Point of Contact in each Judicial District Recommended Creation of Identity Theft Task Forces or Working Groups in each Judicial District i t Recognized need for flexibility in prosecution decisions Recommended review and revision of prosecution guidelines

Maryland Identity Theft Working Group POC designated in mid-2006 First Meeting in October, 2006 Functions: Establishing relationships among state, federal and financial institution investigators and prosecutors Identifying most significant targets Providing a coordinated response to identity theft & fraud Aggressively prosecuting offenders

Maryland Identity Theft Working Group Federal Agencies U.S. Attorneys Office Federal Bureau of Investigation Postal Inspection Service Secret Service Immigration and Customs Enforcement Social Security Administration Diplomatic Security Service Department of Housing and Ub Urban Development - OIG Department of Transportation - OIG IRS Criminal Investigations

Maryland Identity Theft Working Group State and Local Agencies Motor Vehicle Administration Maryland State Police Baltimore City Police Baltimore County Police Howard County Police State s Attorney Office Maryland Department of Transportation Financial Institutions Citigroup American Express Bank of America Chase Wachovia M & T Bank Discover

Maryland Identity Theft Working Group Extremely inclusive. State and local investigators and prosecutors Financial Institutions Everybody eats! There is plenty to go around. (Cases, awards, press) Developed utility players Social Security MVA Financial Institution Fraud Investigators

Maryland Identity Theft Working Group Identify choke points and solve them. Information from SSA Information from Financial Institutions VIDEO!!! Make sure everybody knows everybody else. Assess weaknesses and strengths and divide id the work accordingly. State: Multi-jurisdictional issues, statutory gaps Feds: Jurisdictional issues, statutory gaps

FEDERAL PROSECUTION TOOLS Bread and Butter Bank Fraud (18 U.S.C. Statutes: 1344) Access Device Fraud (18 Federal statutes we use USC U.S.C. 1029) every day to prosecute Identity Theft (18 U.S.C. Financial Identity Theft 1028) Aggravated Identity Theft (18 U.S.C. 1028A) Possession of Stolen Mail (18 U.S.C. 1708) FalseUseofaSocial a Security Number (42 U.S.C. 408)

False Use of a Social Security Number (42 U.S.C. 408) Primary ID Theft Use: Use of a fraudulent SSN to obtain something of benefit such as employment, credit, or a license (ID) or for any other purpose. Can be a fake (non-existent) number, a fraudulently obtained number or another person s actual number Maximum penalty is 5 years in prison

False Claim of Citizenship (18 U.S.C. 911) Another great utility statute which can be used di in a variety of cases where no state t charges are available Any representation to be a US citizen including a citizen of Puerto Rico triggers the statute MVA application Job application Information to Law Enforcement Maximum penalty is three years in prison.

Passport Fraud (18 U.S.C. 1542 & 1543) Primary ID Theft Use: Use of stolen identity to apply for U.S. passport or use of photo-subbed passport Maximum penalty ranges from 10 years to 25 years imprisonment Usually involves use of birth certificate Frequently associated with purchased identity Problematic victim issues Raises terrorism red flags.

Immigration Fraud Variety of statutes available Detention virtually assured often by consent Must move quickly to charge offender once ICE takes custody of them Often involves a document fraud as well

The Hammer: Aggravated Identity Theft 18 U.S.C. 1028A For offenses committed after July 15, 2004 Mandatory 2-year sentence for using, possessing, or transferring a means of identification of another person in connection with certain ID theft predicate crimes Sentence must be consecutive to any other sentence Two or more 1028A sentences may be stacked

The Hammer: Aggravated Identity Theft What is a means of identification? Defined in 18 U.S.C. 1028(d)(7): Any name or number that may be used, alone or in conjunction with any other information, to identify a specific individual, including any --

The Hammer: Aggravated Identity Theft (a) name, social security number, date of birth, official State or government issued driver s license or identification number, alien registration number, government passport number, employer or taxpayer identification number, (b) unique biometric data..., [or] (c) unique electronic identification number, address, or routing code

The Hammer: Aggravated Identity Theft What are Aggravated Identity Theft Predicates? Bank Fraud, Access Device Fraud, Identity Theft, and False Use of a SSN Plus: (everything discussed here except possession of stolen mail) Visa ( green card ) fraud, immigration offenses, mail fraud, and wire fraud

The Hammer: Aggravated Identity Theft Definition of means of identification for charging Aggravated Identity Theft is very broad but note: There is a split in the circuits its concerning whether the defendant must know that the means of identification he is using belongs to another actual person. RESULT: 1028A is a VERY powerful tool for prosecution of Identity Theft There are gaps which prevent it from being a complete solution

Gaps in Aggravated ID Theft Circuits are split on whether the ID thief must know the identity belongs to a real person Mail theft, tax fraud, uttering counterfeit securities, forging endorsement on a Treasury check, credit union embezzlement, and some other predicates notably missing i Aggravated ID Theft doesn t cover corporations.

Making a Federal Case Out of It: ID Theft Prosecution Criteria i Referrals for federal prosecution: From other law enforcement agencies From State, t County, or City prosecuting authorities From Partner Financial Institutions From individual victims Arises out of other cases, including non- financial case

Making a Federal Case Out of It: ID Theft Prosecution Criteria i Case Criteria What cases will we take federally? Criteria are intended to be flexible no hard and fast rules Must be a violation of a federal statute Any of the statutes discussed here today Others we have not had time to discuss.

Making a Federal Case Out of It: ID Theft Prosecution Criteria Federal Prosecution Guidelines generally will take the following into account:* Loss Number of victims Ability to charge 1028A Size, sophistication and cross- jurisdictional nature of organization Corruption (MVA, SSA, other insider) id Impact on victims Association with other crimes *Your mileage may vary.

Some success stories United States v. Pope The Maryland Takeout case Began as a state prosecution Referred to Feds due to multi-jurisdictional nature of the case and victim related issues Further investigation identified a sub- scheme which was solely within one county and referred back there Successful state and federal prosecutions.

Some success stories The Bulgarian Skimmer case Began as two state investigations s and prosecutions in different counties Referred to Feds due to multi-jurisdictional nature of the case and imminent release Defendants were released on bond and fled jurisdiction Because there is a federal indictment we can more easily access international resources to locate and extradite them Have left the state bonds in place to benefit the state and give incentive to bail bondsmen.

On the Horizon Synthetic ti Identity Theft Sanitizing a Credit History Corporate Identity Theft

The Next New Thing Whatever comes next, you can be certain These esec criminals asae are very eys smart. at These guys talk to each other, share information, and pass on techniques which are working. They will never stop. Law enforcement must be equally intelligent, t, equally coordinated, and equally relentless. We can only do that if we pool our resources and work together.

Contact Information Contact Information: Assistant U.S. Attorney (AUSA) Tamera Fine 410-209-4806 (work) 410-961-4502 (cell) tamera.fine@usdoj.gov