bcco pct #4 powerpoint and identity crimes tcole course #3277 participant handout unit 1 - 5
TRANSCRIPT
BCCO PCT #4 PowerPointBCCO PCT #4 PowerPoint
AND
IDENTITY CRIMESIDENTITY CRIMESTCOLE Course #3277
Participant Handout
UNIT 1 - 5
ADMINISTRATIVEADMINISTRATIVE
• Please complete the BCCO PCT #4 Registration form and turn it in now.
• Make sure you sign TCOLE Report of Training (PID#, Full Name and DOB).
• All cell phones off please – pay attention to course materials and show common respect & courtesy.
About Your InstructorAbout Your InstructorCourse Facilitator - Mentor Course Facilitator - Mentor
George D. Little
A.S. & B.S. Criminal Justice & SociologyB.S.CJ Wayland Baptist University, San Antonio
M.S. Criminology & Counter-Terrorism University of the State of New York
2012 T.C.L.E.O.S.E. Professional Achievement AwardCertified Crime Prevention Specialist (C.C.P.S.)
TCLEOSE Basic Instructor Certificate 1984TCLEOSE Master Peace Officer 1991
MP Special Operations Operator Counter-Terrorism 1988Graduate Drug Enforcement Administration Academy 1977
43- years Law Enforcement Experience 43- years Law Enforcement Experience 40-Years Teaching & Instructor Experience40-Years Teaching & Instructor Experience
COURSE/LESSON COURSE/LESSON OVERVIEWOVERVIEW
Educational requirements for Educational requirements for identity crimes training identity crimes training
established by legislative established by legislative mandate: SB473-(78Reg).mandate: SB473-(78Reg).
UNIT ONEUNIT ONE
Learning ObjectivesLearning Objectives
Learning Objective 1.0Learning Objective 1.0: The Participant will be able to recognize the types of identity crimes.
Learning Objective 1.1Learning Objective 1.1: The Participant will be able to provide a definition of identity crime.
Learning Objective 1.2Learning Objective 1.2: The Participant will be able to identify types of crimes associated with identity crimes.
Learning Objective 1.3 Learning Objective 1.3 : The Participant will be able to list personal and financial identifiers.
Learning Objective 1.4 Learning Objective 1.4 : The Participant will be able to identify currents trends associated with identity crimes.
Learning ObjectivesLearning Objectives
1.0 Defining Identity Crimes1.0 Defining Identity Crimes
1.1 Participant will be able to 1.1 Participant will be able to recognize the types of identity recognize the types of identity
crimecrimeAccording to the Federal Trade Commission (FTC):
•31,000 persons were victims of identity crime in 2000.
•During the first seven months of 2003, 131,000 Americans were victimized
• If trends continue, by the end of 2003, those victimized will have increased almost 700% in three years.
• Texas is __________ in the nation in the number of instances of identity crime reported to the FTC.
2013 Statistics2013 StatisticsTotal financial loss attributed to identity theft $24,700,000,000
Misuse of Existing Credit Card 64.1% 64.1%
Misuse of Existing Bank Account 35%35%
Misuse of Personal Information 14.2%14.2%
Identity Fraud & Incident Identity Fraud & Incident RateRate
2011 4.9%2010 4.35%2009 6%2008 5.44%2007 4.51%2006 4.71%2005 5.04%
1.11.1The student will be able to The student will be able to provide a definition of provide a definition of
identity crimeidentity crime
A.A. _________ ______ is the thefttheft or misuse of personal or financial identifiers in order to gain something of value and/or facilitate other criminal activity.
B.B. Types of identity crimes include;
1. identity __________,
2. _______ ______/access device fraud (“skimming”),
3. __________ fraud,
4. ________ fraud,
5. false _______________ fraud, and
6. ______________/visa fraud.
1.11.1 The student will be able to provide The student will be able to provide a definition of identity crime – Cont’da definition of identity crime – Cont’d
1.21.2The student will be able to The student will be able to identify types of crimes identify types of crimes associated with identity associated with identity
crimescrimesIn many instances an identity crime is used as a _______________, through financing or anonymity, to commit other criminal activities such as mail theft, mail fraud, narcotics/drugs, organized crime, financial fraud (money laundering), mortgage fraud, weapons trafficking
homicide, terrorism, wire fraud, or computer crime/Internet intrusions.
Identity crimes can begin with other seemingly unrelated _________ such as robbery (e.g. purse snatching or mugging), computer intrusion, mail theft, theft of trash (“dumpster diving”), or theft of documents or information from businesses, medical facilities, hotels, etc.
1.3 The student will be able to 1.3 The student will be able to list personal and financial list personal and financial
identifiersidentifiersPersonal identifiers includePersonal identifiers include:
1.1.________________, ,
2.2.date of __________, date of __________,
3.3.__________________ ___________ number, ___________ number,
4.4.________________________, ,
Personal identifiers include – Cont’d:
5.5.____________________ number, number,
6.6.____________________ __________ number, __________ number,
7.7.________________________ number, number,
8.8.mother’s mother’s maidenmaiden name, etc. name, etc.
1.3 The student will be able to 1.3 The student will be able to list personal and financial list personal and financial
identifiers – Cont’didentifiers – Cont’d
Financial identifiers includeFinancial identifiers include:
1.1.____________________ ________________ numbers, numbers,
2.2.________________ ________________________ numbers,numbers,
3.3.personal identification numbers personal identification numbers (“PINs”), (“PINs”),
4.4.____________________ account numbers, etc. account numbers, etc.
1.3 The student will be able to 1.3 The student will be able to list personal and financial list personal and financial
identifiers – Cont’didentifiers – Cont’d
1.1.4 The student will be able 1.1.4 The student will be able to identify currents trends to identify currents trends
associated with identity associated with identity crimescrimes
Some of the current trends associated with identity theft involve the usage of current ___________. This provides a unique challenge for consumers and law enforcement by testing their ability to keep up with technological advances and changes.
Some of the more recent scams involve stealing information by;
1.listening in on conversations made on ____________________ ____________,
2.surreptitiously reading other people’s ________________ and ________________,
.
1.1.4 The student will be able to 1.1.4 The student will be able to identify currents trends identify currents trends
associated with identity crimesassociated with identity crimes
Some of the more recent scams involve stealing information by;
3.3.____________________________ into computers,
4.conducting __________________ and e-mail scams, and
5.taking advantage of careless consumers’ online ____________________ and ____________________________.
1.1.4 The student will be able to 1.1.4 The student will be able to identify currents trends associated identify currents trends associated
with identity crimes – Cont’dwith identity crimes – Cont’d
Currently, the Identity Theft Resource Center, www.idtheftcenter.org, is an excellent website for obtaining information on new trends, scams and consumer alerts on identity crimes.
1.1.4 The student will be able to 1.1.4 The student will be able to identify currents trends identify currents trends
associated with identity crimesassociated with identity crimes
2424
DEFINE & PROCESSDEFINE & PROCESS
Process:Process:
Define 1.0:Define 1.0: Explain some current identity crime statistics
2525
DEFINE & PROCESSDEFINE & PROCESS
Process:Process:
Define 1.1:Define 1.1: Explain and define identity crimes
2626
DEFINE & PROCESSDEFINE & PROCESS
Process:Process:
Define 1.2:Define 1.2: Explain some types of crime identified with identity crimes.
2727
DEFINE & PROCESSDEFINE & PROCESS
Process:Process:
Define 1.3:Define 1.3: Explain some personal and financial identifiers associated with identity crime
2828
DEFINE & PROCESSDEFINE & PROCESS
Process:Process:
Define 1.4:Define 1.4: Explain current trends associated with identity crimes.
UNIT TWOHow identity crime occur How identity crime occur
Learning ObjectivesLearning Objectives
Learning Objective 2.0Learning Objective 2.0: The Participant will be able to recognize how identity crime occurs.
Learning Objective 2.1Learning Objective 2.1: The Participant will be able to identify how identity crime is commonly perpetrated.
Learning Objective 2.2Learning Objective 2.2: The Participant will be able to identify techniques used to procure false identification.
2.1. How identity crime 2.1. How identity crime is commonly perpetratedis commonly perpetratedA.A. Identity crimes can occur if someone steals your wallet, purse, briefcase, etc., containing your
1.1.____________________________________,
2.2.__________________ ____________________ card,
3.3.____________________ cards,
4.4.____________________ or __________________________.
B. B. Identity crimes can occur if someone steals your
1.1.________________,
2.especially your bank and credit card _________________,
3.pre-approved ______________________ offers,
4.new ________________________, or
5.5.________________ information.
2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d
C. C. Identity thieves can complete a “____________________ of ______________________ form” to divert your mail to another location.
D. D. Identity thieves may rummage through your trash or the trash of businesses to find personal data (also known as “____________________________ diving”).
2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d
E. E. Identity thieves may fraudulently obtain your credit report by posing as a ________________, __________________, or someone else who may have a legitimate need for (and legal right to) the information.
F. F. Identity thieves can find __________________________ information in your home.
2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d
G. G. Identity thieves may obtain personal information that you share on the ______________________.
2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d
H. H. Identity thieves can get information from the workplace, in a practice known as “____________________________ __________________ theft,” by stealing files out of offices where you are a customer, employee, patient or student, by bribing an employee who has access to your files, or by “hacking” into electronic files.
2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d
I. I. Some identity thieves also engage in “____________________ __________________”: looking over your shoulder or from a nearby location as you enter your Personal Identification Number (PIN) at an ATM machine.
2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d
I. (Cont’d): I. (Cont’d): This practice has gone high-tech, with some thieves utilizing hidden “________ ____________________” positioned near ATMs to observe or record people as they enter their PINs.
2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d
J. J. Many criminals who want to obtain personal data from people online use a technique known as “____________________”: the creation of e-mails and websites that appear to belong to legitimate businesses such as established retail companies, financial institutions, and online auctions sites.
2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d
J. (Cont’d) J. (Cont’d) Consumers receive e-mails from thieves claiming to be legitimate businesses, and are directed to ______________________ that appear to be run by those businesses. The consumers are then directed to enter large amounts of personal data.
2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d
J. (Cont’d): J. (Cont’d): The thieves sending the e-mails or running the websites actually have actually have ________ connection with connection with those businessesthose businesses, and their sole purpose is to obtain the consumers’ personal data so that they can engage in various fraud schemes.
2.1. How identity crime is 2.1. How identity crime is commonly perpetrated – Cont’dcommonly perpetrated – Cont’d
2.2 Techniques used to 2.2 Techniques used to procure false procure false identificationidentification
A wide variety of sources, including ____________________ and ______________________ retailers, provide publications that give criminals step-by-step step-by-step instructions on techniques for instructions on techniques for producing false documentsproducing false documents.
Some of the resources that are available to criminals who want to create false documents.
Examples:
•www.paladin-press.com
•Gun shows
•The Modern Identity Changer by Sheldon Charrett, ISBN 0-87364-946-X #IDENTITY
2.2 Techniques used to procure 2.2 Techniques used to procure false identificationfalse identification
4444
DEFINE & PROCESSDEFINE & PROCESS
Process:Process:
Define 2.0:Define 2.0: Explain how identity crimes occur
4545
DEFINE & PROCESSDEFINE & PROCESS
Process:Process:
Define 2.1:Define 2.1: Explain how identity crime is commonly perpetrated
4646
DEFINE & PROCESSDEFINE & PROCESS
Process:Process:
Define 2.2:Define 2.2: Explain Techniques used to procure false identification.
UNIT THREELAWS
Learning ObjectivesLearning Objectives
Learning Objective 3.0Learning Objective 3.0: The Participant will be able to recognize the legal aspects of identity crimes.
Learning Objective 3.1Learning Objective 3.1: The Participant will be able to identify the federal statutes dealing with identity crimes.
Learning Objective 3.2Learning Objective 3.2: The Participant will be able to identify the state statutes dealing with identity crimes.
Learning Objective 3.3 Learning Objective 3.3 : The Participant will be able to define the term “security alert,” according to the Business Code.
Learning Objective 3.4 Learning Objective 3.4 : The Participant will be able to define “security freeze,” according to the Business Code.
Learning ObjectivesLearning Objectives
3.0 3.0 Laws and Statutes Laws and Statutes Governing Identity Crimes Governing Identity Crimes
FEDERAL LAW STATE LAW
3.1 Federal Statutes dealing 3.1 Federal Statutes dealing with Identity Crimewith Identity Crime
Federal lawFederal law: ______ ____________ § 1028 § 1028 – Identity Theft and Assumption Deterrence Act
3.2 state statutes dealing 3.2 state statutes dealing with identity crimeswith identity crimes
State Law: ______________ __________ ___._______.____ – Fraudulent Use or Possession of Fraudulent Use or Possession of Identifying Information Identifying Information (State Jail Felony)
Business and Commerce Business and Commerce Code, Chapter 20 Code, Chapter 20 - Regulation of Consumer Credit Reporting
3.2 state statutes dealing 3.2 state statutes dealing with identity crimeswith identity crimes
Code of Criminal Procedure, Code of Criminal Procedure, Article 55.02, Sec.2a Article 55.02, Sec.2a – Procedure for Expunction
3.3 Define the term “security 3.3 Define the term “security alert,” according to the Tx-BC.alert,” according to the Tx-BC.
____________________ ______________ – means a notice placed on a consumer file that alerts a recipient of a consumer report involving that consumer file that the consumer’s identity may have been used without the consumer’s consent to fraudulently obtain goods or services in the consumer’s name.
3.4 Define “security 3.4 Define “security freeze,” according to the freeze,” according to the
Business CodeBusiness Code
________________________ ______________________ – means a notice placed on a consumer file that prohibits a consumer reporting agency from releasing a consumer report relating to the extension of credit involving that consumer file without the express authorization of the consumer.
5656
DEFINE & PROCESSDEFINE & PROCESS
Process:Process:
Define 3.0:Define 3.0: Explain the legal aspects of identity crimes.
5757
DEFINE & PROCESSDEFINE & PROCESS
Process:Process:
Define 3.1:Define 3.1: Explain the federal statute dealing with identity crimes
5858
DEFINE & PROCESSDEFINE & PROCESS
Process:Process:
Define 3.2:Define 3.2: Explain Texas Laws and statutes dealing with identity crimes
5959
DEFINE & PROCESSDEFINE & PROCESS
Process:Process:
Define 3.3:Define 3.3: Explain and define the term security alert according to the Business Code.
6060
DEFINE & PROCESSDEFINE & PROCESS
Process:Process:
Define 3.4:Define 3.4: Explain and define the term security freeze according to the Business Code.
UNIT FOURIdentity Theft Crime Identity Theft Crime
Report Report
Learning ObjectivesLearning Objectives
Learning Objective 4.0Learning Objective 4.0: The Participant will be able to request information needed for an ID crime offense report.
Learning Objective 4.1Learning Objective 4.1: The Participant will be able to list information needed for an ID crime offense report.
Learning Objective 4.2Learning Objective 4.2: The Participant will be able to identify the governmental and business entities that are notified in identity crimes.
4.0 Prosecuting Identity 4.0 Prosecuting Identity CrimesCrimes
4.1 Request information 4.1 Request information needed for an ID crime needed for an ID crime
offense report.offense report.
How to request information needed for an ID crime offense report.
4.1 List information needed 4.1 List information needed for an ID crime offense report.for an ID crime offense report.
Taking a __________________ ________________ is vital to the victim(s) because credit because credit bureaus require a police report bureaus require a police report in order to block fraudulent in order to block fraudulent information information and to begin repairing the victim’s credit reports.
In addition, manymany __________________________l l institutions require a police institutions require a police report with an affidavit of fraudreport with an affidavit of fraud.
Refer to your “Identity Crime Incident Detail Form” (Appendix A).
4.1 List information needed 4.1 List information needed for an ID crime offense report for an ID crime offense report
– Cont’d.– Cont’d.
Have the (class participants as a crime victim) fill out an identity crime incident form crime incident form (Appendix A).
4.1 Practical Exercise 4.1 Practical Exercise
This document provides the officer - investigator with detailed information to: Understand the type of incident that occurred,
Organize the __________________________ case,
Determine where ____________________ might be found,
4.1 List information needed for an ID 4.1 List information needed for an ID
crime offense reportcrime offense report..
This document provides the officer/investigator with detailed information to – Cont’d:
Develop a __________________ of how the identity theft occurred, and
Determine what __________institutions should be contacted in the course of the investigation.
4.1 List information needed for an ID 4.1 List information needed for an ID
crime offense reportcrime offense report..
Ask the victim to begin gathering documentation (bank and credit card bank and credit card statements, letters from creditors, statements, letters from creditors, merchant account statementsmerchant account statements, etc.)
4.1 List information needed for an ID 4.1 List information needed for an ID
crime offense reportcrime offense report..
Ask the victim to obtain credit reports from the three major Credit Bureaus
•EquifaxEquifax,
•ExperianExperian, and
•Trans UnionTrans Union and voluntarily give them to you.
4.1 List information needed for an ID 4.1 List information needed for an ID
crime offense reportcrime offense report..
If not given voluntarilyvoluntarily by the victim, a subpoena is needed from the courts to obtain victim credit histories.
4.1 List information needed for an ID 4.1 List information needed for an ID
crime offense reportcrime offense report..
4.2 Governmental and 4.2 Governmental and business entities that are business entities that are notified in identity crimes.notified in identity crimes.
A.A. FFederal BBureau of IInvestigation – Notify if an identity crime is used to commit a bank fraud, governmental fraud or in furtherance of an ________________________ scheme, ____________________ fraud, etc. involving losses over one hundred thousand dollars ($100,000).
B.B. U. S. ______________ ________________ – Notify if there is any custody arrest of individuals associated with identity crime or identity ________________________. This would involve the seizure or recovery of any amount of identity crime devices, equipment, or products such as skimmers (small electronic devices
4.2 Governmental and business 4.2 Governmental and business entities that are notified in entities that are notified in
identity crimes – Cont’didentity crimes – Cont’d
B.B. U. S. Secret Service – Cont’d: that can gather information, such as your name, address, credit limit, and PIN from your credit card); counterfeit identification documents; counterfeit credit cards; or lists of personal identifiers (e.g., names, social security numbers, dates of birth, bank account numbers, and credit card numbers).
4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d
B.B. U. S. Secret Service – Cont’d: that can gather information, such as your name, address, credit limit, and PIN from your credit card); counterfeit identification documents; counterfeit credit cards; or lists of personal identifiers (e.g., names, social security numbers, dates of birth, bank account numbers, and credit card numbers).
4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d
C.C. U. S. Postal Service – Notify if an individual is taken into custody for committing a financial crime involving the U.S. mail. Postal inspectors will respond to violations relating to identity crime, forgery, credit cards and checks, mail theft, mail fraud, and Internet fraud (when the scheme involves use of the U.S. mail).
4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d
D. Social Security Administration – Notify if the misuse of a social security number involved social security program fraud, or if there is either a significant financial loss to an individual or institution, or a significant number of counterfeit social security cards are seized.
4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d
E.E. Federal Trade Commission – Have identity crime victims file a report with the Federal Trade Commission (Appendix B).
Encourage them to use the FTC website (www.consumer.gov/idtheft
4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d
E.E. Federal Trade Commission – Cont’d:Cont’d: At the website, victims can file an online complaint and obtain helpful information such as a victim’s guide (”When Bad Things Happen to Your Good Name”) and the FTC Sample Affidavit. The FTC also has a hotline: 1-877-IDTHEFT (1-877-438-4338).
4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d
F. F. Texas Department of Public Safety - This agency is responsible for the issuance of state driver’s licenses and identification cards. It is also responsible for the storage and expunction of criminal records. Contact the Texas Department of Public Safety at 512-424-2000512-424-2000 and online (www.txdps.state.tx.us/contact.htm).(www.txdps.state.tx.us/contact.htm).
4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d
Other state and local agencies may provide additional assistance with investigating identity crimes.
4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d
G. Consumer Credit Reporting Agencies – Tell victims to have a “____________________ ____________________” placed on their credit reports. The fraud alert will show up on their credit report when companies make inquiries about their credit and may stop additional stop additional fraudfraud. The three major credit-reporting agencies are:
4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d
G. Consumer Credit Reporting Agencies – Cont’d:
EXPERIAN 1-888-397-3742
www.experian.com
TRANS UNION 1-800-680-7289
www.transunion.com
EQUIFAX 1-800-525-6285
www.equifax.com
4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d
H.H. Financial Institutions (e.g., banks, credit card companies, financial advisors) – Advise the victims to contact their financial institutions to report any ____________________________ of identity crime.
4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d
H.H. – Cont’d:
The financial institution can check to see if there has been any unusual activity. Victims should establish ____________________________ for their accounts.
4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d
I.I. __________________________ Companies (e.g., power, water, phone, and cable companies, etc.) – Victims may want to contact their utility companies to report instances of possible identity crime.
The utility companies can check for any unusual account activityunusual account activity.
4.2 Governmental and business entities that are 4.2 Governmental and business entities that are notified in identity crimes – Cont’dnotified in identity crimes – Cont’d
8888
DEFINE & PROCESSDEFINE & PROCESS
Process:Process:
Define 4.0:Define 4.0: Explain how to request information needed for an ID Crime Offense Report
8989
DEFINE & PROCESSDEFINE & PROCESS
Process:Process:
Define 4.1:Define 4.1: Explain (list) information needed for a Crime Offense Report.
9090
DEFINE & PROCESSDEFINE & PROCESS
Process:Process:
Define 4.2:Define 4.2: Explain what government and business entities that are required to be notified in Identity Crimes.
UNIT FIVEUNIT FIVE
Learning ObjectivesLearning Objectives
Learning Objective 5.0Learning Objective 5.0: The Participant will be able to recognize techniques for educating victims and the public on identity crime.
Learning Objective 5.1Learning Objective 5.1: The Participant will be able to identify techniques for educating victims and the public on identity crime.
Learning Objective 5.2Learning Objective 5.2: The Participant will be able to list guidelines for personal protection against identity crime.
Learning Objective 5.3 Learning Objective 5.3 : The Participant will be able to list the steps to take if identity crime occurs.
Learning ObjectivesLearning Objectives
5.0 Identity Crimes 5.0 Identity Crimes PreventionPrevention
Techniques for Techniques for
educating educating victims and the victims and the
public on public on identity crime.identity crime.
5.1 Techniques for 5.1 Techniques for educating victims and the educating victims and the public on identity crime. public on identity crime.
Law enforcement agencies should be ____________________________ in their approach to educating the public about identity crime. Current techniques used to educate the public about other crimes can be used to facilitate information on identity crime.
Some of these techniques may include public service announcements (PSAs), ____________________ __________________________ involvement, etc. Law enforcement agencies can make use of the vast amount of information already available on the Internet to guide the public and victims of identity crime.
5.1 Techniques for educating victims 5.1 Techniques for educating victims and the public on identity crime. and the public on identity crime.
5.2 Guidelines for Personal 5.2 Guidelines for Personal Protection against identify Protection against identify
crime crime
Emphasize the fact that the more a person becomes ______________________ about his/her financial records the better prepared he/she will be if they become a victim of identity crime.
Inform the public that they should:
1. Not give out personal __________________ over the phone or on the Internet - this includes their social security number, driver’s license number, date of birth, place of birth, home address, mother’s maiden name, and any passwords.
5.2 Guidelines for Personal Protection 5.2 Guidelines for Personal Protection against identify crime – Cont’d against identify crime – Cont’d
Inform the public that they should:
2.Limit the amount of personal information on their ____________________ - it is recommended that you do not put do not put your driver’s license, identification your driver’s license, identification card or social security number on card or social security number on your checksyour checks
5.2 Guidelines for Personal Protection 5.2 Guidelines for Personal Protection against identify crime – Cont’d against identify crime – Cont’d
Inform the public that they should:
3.Check ____________________ histories and bank records frequently and look for signs of inaccurate or suspicious activity
4.Keep detailed records of ______________________, check writing, credit card use, and ATM use
5.2 Guidelines for Personal Protection 5.2 Guidelines for Personal Protection against identify crime – Cont’d against identify crime – Cont’d
Inform the public that they should:
5.Destroy __________________ __________________ of credit card receipts
6.Purchase a home ___________ or completely destroy any item that may have personal identifiers rather than discarding them in the trash
5.2 Guidelines for Personal Protection 5.2 Guidelines for Personal Protection against identify crime – Cont’d against identify crime – Cont’d
Note: Note: Some insurance companies offer optional coverage to their policyholders to assist them with certain expenses incurred if they become victims of identity crime.
5.2 Guidelines for Personal Protection 5.2 Guidelines for Personal Protection against identify crime – Cont’d against identify crime – Cont’d
5.3 Steps to take if Identity 5.3 Steps to take if Identity Crime occursCrime occurs
Refer to participant handout “ID Theft Affidavit” (Appendix B). The forms provide victims with detailed instructions on completion and submission of the affidavit.
The affidavit should be sent to the companies or businesses where the ____________________was perpetrated.
5.3 5-STEPS 5.3 5-STEPS
1. Notify the police – Make a reportreport. Get the names of the officers you contact and the police report number for your records.
Be specificspecific as to which kind of identity crime happened, such as bad checks, credit card abuse, or the misuse of your name, driver’s license, or identification card.
2. Notify ____________________ and merchants – Cancel credit cards and Cancel credit cards and close your accountsclose your accounts. Contact the creditors and merchants that are affected.
Get the names of any employees employees you have contact withyou have contact with, and ask for a reference number on each item that you are disputing
5.3 5-STEPS - Cont’d 5.3 5-STEPS - Cont’d
3. Notify your banks and financial institutions – Change affected Change affected bank accountsbank accounts. Advise the banks of the situation and find out what is required to clear anything that affects your banking services. This could relate to checks, ATM cards, debit cards, etc.
5.3 5-STEPS - Cont’d 5.3 5-STEPS - Cont’d
4. Check your credit – Notify the major __________________ reporting agencies as well as local credit reporting companies, and advise them of your situation. You may be able to request that a ______________ be put on any attempt to gain credit under your name and your date of birth without your confirmation.
5.3 5-STEPS - Cont’d 5.3 5-STEPS - Cont’d
5. Check with the Social Security Administration – Make sure that earned income benefits earned income benefits are accurate.
5.3 5-STEPS - Cont’d 5.3 5-STEPS - Cont’d
Check to see if there is any Check to see if there is any action on your social security action on your social security number that should not be number that should not be therethere.
5. Cont’d: Get as much information as you can, and follow through with what is requested of you.
5.3 5-STEPS - Cont’d 5.3 5-STEPS - Cont’d
110110
DEFINE & PROCESSDEFINE & PROCESS
Process:Process:
Define 5.1:Define 5.1: Explain techniques for educating victims and public on identity crime.
111111
DEFINE & PROCESSDEFINE & PROCESS
Process:Process:
Define 5.2:Define 5.2: Explain some guidelines for personal protection against identity crime.
112112
DEFINE & PROCESSDEFINE & PROCESS
Process:Process:
Define 5.3:Define 5.3: Explain the steps to take if identity crime occurs.
SOURCESSOURCES
All Course Sources and/or
Resources are listed in
your Participant Handout
IDENTITY CRIMES TCOLE Course # 3277TCOLE Course # 3277
““Knowledge isKnowledge is““POWERPOWER” Stay ” Stay informed, stay informed, stay
SAFE, stay SAFE, stay Vigilant & stay Vigilant & stay
Alive” Alive”
UPCOMING TRAININGUPCOMING TRAININGCurrent TRAINING Schedule of Courses offered by
Bexar County Constable’s Office Bexar County Constable’s Office PCT#4PCT#4
Racial Profiling Course – TCOLE Course #3256 (8-hrs) 8-hrs on Saturday October 4th, 2014 from 10:30 am to 7:30 pm.
Racial Profiling Course – TCOLE Course #3256 (8-hrs) on Friday October 10, 2014 from 8:00 am to 5:00 pm 115
Bexar County Constable’s Office PCT#4 Bexar County Constable’s Office PCT#4TRAINING SCHEDULE TRAINING SCHEDULE
2014 2014
Current TRAINING Schedule of Courses offered by Bexar County Constable’s Office PCT#4Eye Witness Evidence Course – TCOLE Course # 3286 (4-hrs) Saturday October 11, 2014 from 10:30 am to 2:30 pm
Eye Witness Evidence Course – TCOLE Course # 3286 (4-hrs) Sunday October 12th, 2014 from 11:00 am to 3:00 pm.
Eye Witness Evidence Course – TCOLE Course # 3286 (4-hrs) Friday October 17th, 2014 from 1:00 pm to 5:00 pm.
117
Advanced TCOLE Instructor Course – TCOLE #1017 (40hrs), Day One Saturday November 1st ,2014 from 11:00 am to 6:00 pm (Deputy Chief George D. Little and Deputy Constable Roland Berg)
Advanced TCOLE Instructor Course – TCOLE #1017, Day Day TwoTwo Sunday November 2nd ,2014 from 11:00 am to 6:00 pm (Deputy Chief George D. Little and Deputy Constable Roland Berg)
Advanced TCOLE Instructor Course – TCOLE #1017, Day Day ThreeThree Friday November 7th ,2014 from 9:00 am to 6:00 pm (Deputy Chief George D. Little and Deputy Constable Roland Berg ) Lesson Presentation preparation time. Instructors available
Advanced TCOLE Instructor Course – TCOLE #1017, Day Day FourFour Saturday November 8th,2014 from 11:00 am to 6:00 pm (Deputy Chief George D. Little and Deputy Constable Roland Berg)
118
Advanced TCOLE Instructor Course – TCOLE #1017, Day Day FiveFive & Grad Sunday November 9th, 2014 from 11:00 am to 6:00 pm – Presentations, Final Test & Graduation (Deputy Chief G. D. Little and Dep. Constable R. Berg )
HIV-AIDS & Viral Hepatitis in Criminal Justice Profession Course – TCOLE # 3804 (8-hrs) 8-hrs on Saturday November 15th, 2014 from 10:00 am to 6:00 pm.
HIV-AIDS & Viral Hepatitis in Criminal Justice Profession Course – TCOLE # 3804 (8-hrs) 4-hrs on Thursday December 4th, 2014 from 1:00 am to 5:00 pm
HIV-AIDS & Viral Hepatitis in Criminal Justice Profession Course – TCOLE # 3804 (8-hrs) 4-hrs on Friday December5th, 2014 from 1:00 am to 5:00 pm
KNOWLEDGE IS POWERKNOWLEDGE IS POWER
• Please complete a course and instructor evaluation form.
• If you rate 2 or below you must justify on reverse side.
•Constructive Criticism Constructive Criticism helps all, being negative helps no one.
COURSE & INSTRUCTOR COURSE & INSTRUCTOR EVALUATION FormEVALUATION Form